Curity Identity Server (OpenID Connect)
TL;DR
To secure access to ngrok with Curity Identity Server using OpenID Connect:
This article details how to configure Curity as the primary Identity Provider for ngrok tunnels. By integrating Curity Identity Server with ngrok, you can:
- Restrict access to ngrok tunnels to only users who authenticated via Curity
- Use Curity security policies, MFA authenticators — including BankId, SITHS, and WebAuthn — to control access to ngrok tunnels.
- Use Curity's Dashboard to facilitate access to ngrok apps.
Requirements
To configure ngrok tunnels with Curity, you must have:
- an Curity account with administrative rights to create clients
- an ngrok Enterprise Account with an authtoken or admin access to configure edges with OpenID Connect.
Configuration Steps
To integrate ngrok with Curity Identity Server, you will need to:
- Configure Curity with the ngrok app
- Configure ngrok with the SSO settings provided by Curity
Step 1: Configure Curity Authentication
The Curity Identity Server provides an authenticator called html-form
that is suitable for setting up a login with username and password. It uses a Credential Manager to verify the credentials, which in turn uses a data-source. There any many options for stronger authentication than username and password. A list of possible authentication methods is available here.
Add Authentication
-
Add an Authenticator
- Navigate to Profiles > Authentication Service > Authenticators.
- Click New Authenticator on the authenticator page and give it a name.
- Select the
HTML-Form