This article was originally published on the Okta developer blog. Thank you for supporting the partners who make SitePoint possible.
Building local or social login in Node can be simple with Passport.js. There are over 500 strategies already built that make it easy to wire up identity providers. But what do you do if your identity provider doesn’t already have a pre-built strategy? Do you have to build all that stuff yourself? Absolutely not! You can use generic strategies for Passport.js that make it easy to use your provider of choice without having to write all the plumbing yourself. In this tutorial we’ll walk through how to use my identity provider of choice (Okta) with the generic
passport-openidconnect package to build secure Node authentication and user management!
Before we get started, let me tell you what Okta is, and why I think Okta is a no-brainer choice for your next Node project.
What is Okta?
Okta is a cloud service that allows developers to create, edit, and securely store user accounts and user account data, and connect them with one or multiple applications. Our API enables you to:
- Authenticate and authorize your users
- Store data about your users
- Perform password-based and social login
- Secure your application with multi-factor authentication
- And much more! Check out our product documentation
In short: we make user account management a lot easier, more secure, and more scalable than what you’re probably used to.
Sound amazing? Register for a free developer account, and when you’re done, come on back so we can learn more about building secure authentication in Node.
Now, let’s dive in!
The post Build Secure Node Authentication with Passport.js & OpenID Connect appeared first on SitePoint.