Skip to content

Conversation

@Aveerayy
Copy link

@Aveerayy Aveerayy commented Oct 9, 2025

Summary

Adds Okta as a social authentication provider with additional auth configuration improvements.

Changes

  • ✅ Okta OAuth support with OKTA_ISSUER configuration
  • ✅ Google/Microsoft force account selection flags (*_FORCE_ACCOUNT_SELECTION)
  • ✅ Respect DISABLE_EMAIL_SIGN_IN and DISABLE_SIGN_UP environment variables
  • ✅ Enhanced OAuth documentation with setup guides
  • ✅ Secret tainting for improved security

Environment Variables Added

OKTA_CLIENT_ID=your_okta_client_id
OKTA_CLIENT_SECRET=your_okta_client_secret
OKTA_ISSUER=https://your-okta-domain/oauth2/default
GOOGLE_FORCE_ACCOUNT_SELECTION=1
MICROSOFT_FORCE_ACCOUNT_SELECTION=1
DISABLE_EMAIL_SIGN_IN=1
DISABLE_SIGN_UP=1

Testing

  • Local build successful
  • TypeScript checks pass
  • UI components render correctly

- Add Okta as social authentication provider with OKTA_ISSUER support
- Add Google/Microsoft force account selection flags
- Respect DISABLE_EMAIL_SIGN_IN and DISABLE_SIGN_UP environment variables
- Update OAuth documentation with Okta setup and configuration options
- Implement secret tainting for enhanced security
@vercel
Copy link

vercel bot commented Oct 9, 2025

@Aveerayy is attempting to deploy a commit to the cgoinglove's projects Team on Vercel.

A member of the Team first needs to authorize it.

@brrock
Copy link
Collaborator

brrock commented Oct 10, 2025

Thank you, this is much cleaner implementation, could you add MCP auth with okta?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants