Skip to main content

Curity Identity Server (OpenID Connect)


To secure access to ngrok with Curity Identity Server using OpenID Connect:

  1. Configure Curity Identity Server
  2. Configure ngrok
  3. Test access to ngrok with Curity Identity Server

This article details how to configure Curity as the primary Identity Provider for ngrok tunnels. By integrating Curity Identity Server with ngrok, you can:

  • Restrict access to ngrok tunnels to only users who authenticated via Curity
  • Use Curity security policies, MFA authenticators — including BankId, SITHS, and WebAuthn — to control access to ngrok tunnels.
  • Use Curity's Dashboard to facilitate access to ngrok apps.


To configure ngrok tunnels with Curity, you must have:

  • an Curity account with administrative rights to create clients
  • an ngrok Enterprise Account with an authtoken or admin access to configure edges with OpenID Connect.

Configuration Steps

To integrate ngrok with Curity Identity Server, you will need to:

  1. Configure Curity with the ngrok app
  2. Configure ngrok with the SSO settings provided by Curity

Step 1: Congfigure Curity Authentication

The Curity Identity Server provides an authenticator called html-form that is suitable for setting up a login with username and password. It uses a Credential Manager to verify the credentials, which in turn uses a data-source. There any many options for stronger authentication than username and password. A list of possible authentication methods is available here.

Add Authentication

  1. Add an Authenticator

    1. Navigate to Profiles > Authentication Service > Authenticators.
    2. Click New Authenticator on the authenticator page and give it a name.
    3. Select the HTML-Form Authenticator type in the grid of authenticators and click Next.
    4. Under HTML Form Settings, select the default-account-manager as account manager and default-credential-manager as credential manager. img/username-03.jpg
  2. Commit the changes

    1. Commit the changes via the Changes menu.


Step 2: Configure Curity for OIDC

Add an openid client in Curity

  1. Add New Client

    1. Navigate to Profiles > Token Service > Clients and click + New Client.
    2. Give the client an ID (eg. www for a website client) and click Create.
  2. Add Capabilities

    1. Scroll down to the Capabilities section and click Add capabilities.

    2. Select the Code Flow capability and click Next.


    3. Enter http://localhost/callback as a Redirect URI and click Add. config-callback.jpg

    4. Click Next.

    5. On the Client Authentication screen, select secret.

    6. Click Generate to generate a new secret. config-client-authentication.jpg

      1. Copy the secret since it cannot be retrieved later again (but can be reset).
    7. On the User Authentication screen, select the HTML-form authenticator created in Step 1.

    8. Click Done.

    9. Scroll down on the newly created client page to Scopes and Claims.

    10. Select openid from the list of scopes in the dropdown menu. config-openid-scope.jpg

  3. Expose the metadata url

    ngrok makes a call to the /.well-known/openid-configuration endpoint at Curity to pull configuation data specific to your Authorization Server.

    1. Navigate to Profiles > Token Service > General page.
    2. Scroll down to the OpenID Connect section and enable the Expose Metadata toggle. expose-metadata.png
  4. Commit the changes

    1. Commit the changes via the Changes menu.


Step 3: Configure ngrok

ngrok can leverage Curity Identity Server in two ways:

  • From the ngrok CLI (using the --oidc parameter)
  • From the ngrok dashboard

Option 1: ngrok CLI

Note: For this tutorial, we assume you have an app running locally (i.e., on localhost:3000) with the ngrok client installed.

  1. Launch a terminal

  2. Enter the following command to launch an ngrok tunnel with Curity Identity Server. Replace <curity_url> with your Curity issuer address (i.e., and the <curity_client_id> and <curity_client_secret> with the respective values copied from the ngrok app registered at Curity:

    ngrok http 3000 --oidc=<curity_url> \
    --oidc-client-id=<curity_client_id> \
    --oidc-client-secret=<curity_client_secret> \
  3. Skip to Step 4: Test the integration

Option 2: ngrok Edge

To configure an edge with Curity:

  1. Go to

  2. Click Cloud Edge > Edges

  3. If you don't have an edge already set to add Curity Identity Server, create a test edge:

    • Click New Edge
    • Click HTTPS Edge
    • Click the pencil icon next to "no description". Enter Edge with Curity Identity Server as the edge name and click Save.
  4. On the edge settings, click OIDC.

  5. Click Begin setup and enter the following:

    Curity config in ngrok

  6. Click Save.

  7. Launch a tunnel connected to your Curity edge:


For this step, we assume you have an app running locally (i.e. on localhost:3000) with the ngrok client installed.

  1. Click Start a tunnel.

  2. Click the copy icon next to the tunnel command.

    tunnel config

  3. Launch a tunnel:

    • Launch a terminal
    • Paste the command. Replace http://localhost:80 with your local web app addess (i.e., http://localhost:3000)
    • hit Enter. an ngrok tunnel associated to your edge configuration is launched.
  4. To confirm that the tunnel is connected to your edge:

    • Return to the ngrok dashboard
    • Close the Start a tunnel and the Tunnel group tabs
    • Refresh the test edge page. Under traffic, You will see the message You have 1 tunnel online. Start additional tunnels to begin load balancing

    tunnel confirmed

  5. In the test edge, copy the endpoint URL. (you will use this url to test the Curity Authentication) tunnel url

Step 4: Test the integration

  1. In your browser, launch an incognito window.
  2. Access your ngrok tunnel (i.e., or using a copied URL).
  3. You should be prompted to log in with your Curity credentials.
  4. After login, you should be able to see your web app.