HYPR
Integration guide for adding HYPR as a passwordless authentication provider
HYPR provides customers with a passwordless login experience using a smart phone, a security key, or the built in authenticators available for devices running versions of Windows and MacOS that support FIDO protocols.

Pre-requisits

You need to configure both a HYPR tenant and a HYPR Keycloak tenant to set up passwordless authentication on the HYPR side. Refer to the HYPR documentation for more details on configuring HYPER.

HYPR tenant

In the HYPR tenant, you will need to:
  • Configure a HYPR admin tenant to use with your Strivacity application
  • Configure a push provider
  • Generate a HYPR application ID
  • Generate an access token to be associated with the HYPR application ID
  • Have all of the users who will use passwordless authentication in the HYPER identity store
In the HYPR Keycloak tenant, you will need to:
  • Conigure a valid HYPR Keycloak tenant to associate with your HYPR tenant
  • Configure a HYPR Keycloak tenant realm
  • Configure a tenant authenticator and execution
  • Configure a HYPR Keycloak tenant OAuth client configured and associated with the client ID and secret
  • Capture the OIDC auto-discovery URL for the Keycloak tenant you just created
  • Have users in the HYPR Keycloak realm that match the usernames found in the HYPR admin tenant

Strivacity

In the Strivacity admin console, you will set up an enterprise login provider and configure it to use the HYPR tenant you configured above. You will then associate that login provider with the applications you want to use the HYPR passwordless login flow.

Set up an Enterprise Login Provider

Refer to Setup an External OIDC Identity Provider for more details.
  • In the Strivacity admin console, navigate to External Login > Enterprise Login and click the "Create Enterprise Login Provider" button
Enterprise Login Provider List
  • Select the OpenID login provider template
  • Name this login provider
  • Define the text to be used on this login provider's button. (This button can be skipped if only one login provider is defined and the appropriate application setting is configured. See the next section).
  • Add an optional description
  • In the Cliend ID field, enter the client ID from the HYPR configuration
  • In the Client Secruet field, enter the client secret from HYPR configuration
  • Selected “Auto Discovery” to on
  • Enter the auto discovery URL from HYPR console
OIDC Configuration
  • Select the appropriate scopes you would like to request from the HYPR ID token
  • Select whether you'd like to syncronize profile data at each login
  • Click save
Scopes ad Customer Data Handling
You are now ready to associate this login provider with one or more applications in your Strivacity admin console.

Set up an application

  • In the Strivacity admin console, navigate to Applications
  • Select the application you wish to use the HYPR login provider, or create a new application
Application list
  • Scroll down to Login Providers and enable Interactive Login and Registration
  • Disable Local login
  • Add the HYPR enterprise login provider
  • Allow forwarding customer to external provider. This allows skipping the enterprise login provider selection screen when there is only one enterprise login provider configured
  • Click save
Application Login Provider Configuration
Test the login flow to your application to be sure everything is working as expected.