Skip to content
API Reference
Configuration

Identity Providers

Connect your own OAuth 2.0 identity provider to a Keycard zone

Keycard provides zone user authentication by default. If you want to use your own identity provider (Okta, Auth0, Google, etc.) for zone-level user authentication, follow the steps below.

  1. Get your OAuth Redirect URL

    • In Keycard Console, navigate to Zone Settings (click your zone name in the sidebar)
    • Copy the OAuth 2 Redirect URL (format: https://<zone-id>.keycard.cloud/oauth/2/redirect)
    • Keep this URL handy for the next step
  2. Configure your identity provider

    In Okta:

    1. Navigate to ApplicationsCreate App Integration
    2. Select OIDC - OpenID Connect and Web Application
    3. Add the OAuth Redirect URL to Sign-in redirect URIs
    4. Enable grant types: Authorization Code, Refresh Token
    5. Assign users to the application
    6. Note your Issuer URL, Client ID, and Client Secret

    In Keycard Console:

    1. Click Providers in the sidebar and then ‘Add Provider’
    2. Enter Issuer URL: https://your-domain.okta.com
    3. Enter Client ID and Client Secret
    4. Click Connect
  3. Select the identity provider for the zone

    In Keycard Console:

    1. Click Zone Settings in the sidebar
    2. Select the Identity Provider dropdown
    3. Select the Provider you just configured
    4. Save your changes
OAuth flow fails or redirects to error page
  • Verify the OAuth Redirect URL is correctly added to your identity provider
  • Ensure your identity provider’s issuer URL is correct (include/exclude trailing / as required)
  • Check that users are assigned to the application in your identity provider