Skip to main content
Version: 11.1.0

OpenID Connect Integration in CC

HYPR exposes an OpenID Connect (OIDC) provider that any standards-compliant OIDC relying party (RP) can delegate authentication to. When HYPR Affirm is configured as the authenticator on the OIDC integration, every sign-in attempt from the RP is routed into the configured HYPR Affirm verification flow. After the requester completes verification, HYPR returns an id_token to the RP, which then enforces its own access policies against the verified identity.

This article walks through the end-to-end setup using Cloudflare Zero Trust as the worked example. The same pattern applies to other OIDC relying parties; consult your RP's vendor documentation for the equivalent fields described in the Configure the Relying Party section.

Authentication Flow

  1. A user attempts to access an application protected by the OIDC relying party (for example, Cloudflare Access).
  2. The RP redirects the user to HYPR for authentication via OIDC.
  3. HYPR routes the user into the configured HYPR Affirm verification flow.
  4. The user completes the configured verification steps (for example, government-issued ID and biometric verification).
  5. HYPR checks a connected directory to confirm the verified identity matches an existing account.
  6. HYPR completes the OIDC flow, issuing an id_token and redirecting the user back to the RP.
  7. The RP enforces its access policies and grants or denies application access based on the verified identity.

Architecture Overview

HYPR performs the identity verification, the relying party enforces access policy, and the protected application receives a verified identity context.

Prerequisites

  • A HYPR tenant with administrator access
  • A connected directory in HYPR Control Center (Okta, Microsoft Entra ID, or another supported directory)
  • HYPR Affirm enabled on the tenant, with at least one verification flow already authored
  • An account with the OIDC relying party (Cloudflare Zero Trust in this example) and administrator access to its identity-provider configuration
  • A protected application configured behind the relying party (for example, an application protected by Cloudflare Access)
  • A test user that exists in the connected directory

Collect Your Relying Party Callback URL

The relying party's callback URL is required when configuring the HYPR OIDC integration. Locate it before starting in HYPR.

For Cloudflare Zero Trust:

  1. Sign in to the Cloudflare One dashboard.

  2. Open Settings > Team name and domain (some UI versions label this General).

  3. Copy the team domain. The callback URL takes the following form:

    https://{ZERO_TRUST_TEAM_NAME}.cloudflareaccess.com/cdn-cgi/access/callback

    Replace {ZERO_TRUST_TEAM_NAME} with your team name. Save the resulting URL for the next section.

Other OIDC Relying Parties

For other relying parties, locate the callback URL the RP exposes for an external OIDC provider. Vendor documentation typically lists this under "identity provider", "OAuth callback", or "redirect URI".

Create the OIDC Integration in HYPR Control Center

In HYPR Control Center, register the relying party as an OIDC integration.

  1. Go to the Integrations screen and click Add New Integration.

  2. Select OpenID Connect.

  3. Complete the integration form:

    FieldValue
    OpenID Connect Application NameA descriptive name, for example HYPRAffirmCloudflareOIDC. Spaces and special characters are removed automatically; the name is limited to 23 characters.
    OIDC Redirect URL ListThe relying party callback URL collected in the previous section. Enter multiple values as a comma-separated list if more than one RP shares this integration.
  4. Click Add Integration. On success, the Integration Added confirmation appears.

  5. Click Maybe Later to return to the integration's main page.

  6. HYPR displays the generated client credentials and discovery endpoint on the same form. Keep this tab open or copy the values now — these are needed when configuring the relying party.

    FieldDescriptionWhere it goes in the RP
    OIDC Client IDClient ID generated by HYPRRP Client ID
    OIDC Client SecretClient secret generated by HYPRRP Client Secret
    Well-Known Endpoint URLOpenID Connect discovery document URLRP Certificate URL or discovery endpoint field
  7. Click Update Integration to save.

Configure HYPR Affirm as the Authenticator

By default, an OIDC integration uses the standard HYPR passwordless sign-in. To route every sign-in through a HYPR Affirm verification flow, enable Affirm as the authenticator on the integration's Login Settings tab.

Verification Flow Required

Author the verification flow before enabling the override. The drop-down only lists flows that already exist in HYPR Affirm. For verification-flow setup, see Verification Flows in the HYPR Affirm configuration guide.

  1. From the OIDC integration page, open the Login Settings tab.

  2. Locate the [Affirm] Authenticator section. Under HYPR Affirm Settings:

    • Toggle Enable Affirm Override to On.
    • In Verification Flow, select the HYPR Affirm verification flow that should run when users sign in through this integration.
  3. Click Save.

  4. Attach the verification flow to the OIDC integration's relying party application (RpApp). This step is required for the integration to route into the intended Affirm flow.

Enable the Integration

After saving Login Settings, enable the integration so HYPR begins servicing sign-in requests from the relying party.

  1. Open the Integration Settings tab.
  2. Scroll to Integration Status and click Enable.
  3. HYPR confirms the activation; the integration is now ready to receive OIDC traffic.
Enable, Enroll, and Audit

Continue with the HYPR Integrations common UI experience in the Integrations main page to complete enabling your integration, enrolling users, and monitoring activity with the integration's Audit Trail.

Configure the Relying Party

Copy the following values from HYPR's integration form and paste them into your relying party's OIDC provider configuration:

ValueHYPR field
OAuth client identifierOIDC Client ID
OAuth client secretOIDC Client Secret
OIDC endpointsDerived from the Well-Known Endpoint URL — open that URL in a browser to retrieve the JSON discovery document, which lists authorization_endpoint, token_endpoint, and jwks_uri

The sections below show where to enter these values for each supported relying party. If your RP is not listed, consult its documentation for the equivalent OIDC identity-provider configuration fields.

Cloudflare Zero Trust

  1. In Cloudflare One, go to Settings > Authentication and click Add new under Login methods.

  2. Select OpenID Connect.

  3. Provide the following values:

    Cloudflare fieldValue
    NameA descriptive label, for example HYPR Affirm
    App ID / Client IDThe OIDC Client ID from HYPR
    Client SecretThe OIDC Client Secret from HYPR
    Auth URLThe authorization_endpoint value from the discovery document
    Token URLThe token_endpoint value from the discovery document
    Certificate URLThe jwks_uri value from the discovery document
    Email Claimemail
    OIDC Scopesopenid, email, profile
    Proof Key for Code Exchange (PKCE)Off
    Enable SCIMOff
  4. Click Save.

Test the Integration

Validate the end-to-end flow before exposing the protected application to users.

  1. From the relying party admin UI, open the OIDC provider entry created above.
  2. Trigger the connection test (for Cloudflare, this is the Test button on the provider entry; for other RPs, consult the vendor docs).
  3. When prompted, supply the test user's email address.
  4. Complete the HYPR Affirm verification flow.
  5. Confirm the relying party reports a successful connection result.

Validation Checklist

  • The user is redirected from the relying party to HYPR and back to the RP callback successfully.
  • HYPR routes the user into the expected HYPR Affirm verification flow.
  • Token exchange succeeds with no endpoint or certificate errors.
  • The relying party's access policy returns the expected allow or deny outcome for the test user.
  • The protected application receives an authenticated identity context after a successful policy evaluation.

What This Enables

  • Centralized policy enforcement at the relying party (for example, Zero Trust policies in Cloudflare).
  • High-assurance identity verification through HYPR Affirm verification flows for every sign-in.
  • Consistent access decisions across any application protected by the relying party, all routed through the same HYPR Affirm flow.