On This Page
Okta offers multiple integration options when designing an authentication experience. The two most recommended concepts are using the Okta-hosted Sign-In Widget and the Customer-hosted Sign-In Widget. Both of these Okta-built experiences provide easy implementation and maintenance, industry best practice, user self service, and built-in user registration. The difference between the two concepts is where the Sign-In Widget itself is hosted.
The Okta-hosted Sign-In Widget is considered the easiest and most secure means of integration. This is because the Sign-In Widget itself is hosted by Okta, maintained by Okta, and kept secure by Okta. The Okta-hosted Sign-In Widget is recommended for most integrations. The OpenID Connect redirect flow is used to redirect users to Okta, where the user authenticates and is redirected back to a specified, allow listed, redirect URI. This design is considered security best practice. The look and feel, as well as the enabled features, are all configured within the Okta Admin Console. HTML customization of the page is accessible in the Admin Console, which provides a moderate level of customization to the experience itself.
- Easy to maintain with no maintenance and no updates.
- Hosted and secured by Okta.
- No XSS (opens new window) (cross-site scripting) attacks.
- Easy to integrate.
- Complex logic changes that require source code access are limited.
- The user is redirected out of the application, to Okta, and then back.
- Moderate maintenance may be required. If using CDN, maintenance is more limited as it is being kept up-to-date by Okta. NPM packages a specific version of the widget, which means that it may need to be updated in the project periodically. Customized or local versions of the Sign-In Widget source code would require regular updating.
- Still considered very secure if implemented using recommended best practices.
- A great level of source code customization control while being drastically easier, and more secure, than building from scratch.
- Slightly increased risk in security due to Okta not being able to guarantee that the Sign-In Widget has been implemented correctly. Specifically, the application code may have the ability to access the credentials that the user has entered into the Sign-In Widget, which need to be kept secure. This isn't a risk if implemented correctly.
- Potentially susceptible to XSS (cross-site scripting) attacks.
- Higher level of effort to integrate and maintain compared to the Okta-hosted Sign-In Widget.
- Keeps the user in the application, reducing redirects to and from Okta.
Continue reading about the Okta-hosted Sign-In Widget in the Sign Users In guide.
Continue reading about the customer hosted experience in the Okta Sign-In Widget guide.