Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The HYPR connector enables passwordless authentication using the HYPR platform. It supports device-based authentication and QR code flows — allowing users to authenticate without passwords using their registered mobile device. The Orchestrator uses OIDC internally, but the Console exposes HYPR-specific configuration fields for the HYPR domain, application, and access token.Use Cases
- Passwordless SSO across legacy and modern apps — Replace passwords with HYPR device-based authentication and extend it to applications that lack native HYPR support, unifying passwordless SSO through the Orchestrator
- Phishing-resistant MFA for IdP consolidation — Add strong, phishing-resistant multi-factor authentication as part of an IdP rationalization strategy, strengthening security posture while reducing reliance on legacy MFA solutions
- QR code authentication for shared workstations — Enable users to scan a QR code with the HYPR mobile app for fast, secure authentication on shared or kiosk devices where passwords are impractical
- Zero-trust authentication upgrade — Layer HYPR passwordless authentication into existing identity infrastructure through the Orchestrator, upgrading security without replacing or reconfiguring individual applications
Setup
- Console UI
- Configuration
To create a HYPR connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select HYPR.
- Enter a Name — this is the friendly name that identifies your provider.
- Enter the HYPR Domain — the base domain of your HYPR account (e.g.,
your-org.hypr.com). - Enter the HYPR App ID — the name of the application as defined in the HYPR Control Center.
- Enter the Access Token — an access token configured in the HYPR Control Center. Use the show/hide toggle to verify the value.
- Optionally enable QR Authentication to display a QR code that users can scan with the HYPR mobile app. This toggle is off by default.
- Optionally set a Status Check URL to monitor the HYPR service status.
- Optionally set a Login URL to define a custom endpoint for posting user credentials.
- Optionally upload a Custom Login HTML file to customize the login page displayed to users.
- Optionally upload a Custom Interstitial HTML file to customize the interstitial page displayed during authentication.
- Optionally upload a Custom Error HTML file to customize the error page displayed when authentication fails.
- Click Save.
Custom HTML Pages
The HYPR connector serves three pages during the authentication flow: a login page where users enter their username, an interstitial page displayed while the user responds to the HYPR prompt on their device, and an error page displayed when authentication fails. You can customize each page by providing your own HTML templates. Custom HTML templates are Gohtml/template files. The Orchestrator injects template values at render time that you can reference using {{ "{{" }} .FieldName {{ "}}" }} syntax.
Template Values
The following template values are available in custom HTML pages:| Value | Available In | Description |
|---|---|---|
{{ "{{" }} .LoginURL {{ "}}" }} | Login, Error | The URL for the login form action and retry links |
{{ "{{" }} .RedirectURL {{ "}}" }} | Login, Interstitial | The originally requested URL — include as a hidden form field so the user is redirected after login |
{{ "{{" }} .StatusCheckURL {{ "}}" }} | Interstitial | The URL the page should poll to check if the user has completed authentication on their device. Returns plain text: COMPLETED when successful, CANCELED when the user declines |
{{ "{{" }} .QRCodeImg {{ "}}" }} | Interstitial | Base64-encoded QR code image for scanning with the HYPR mobile app (only populated when qrAuthentication.enabled is true) |
{{ "{{" }} .QRDynamicLink {{ "}}" }} | Interstitial | A dynamic link that opens the HYPR mobile app directly — serves as a fallback when scanning the QR code fails (only populated when qrAuthentication.enabled is true) |
{{ "{{" }} .QRFallbackCode {{ "}}" }} | Interstitial | A fallback code for HYPR authentication when QR scanning is not available (only populated when qrAuthentication.enabled is true) |
{{ "{{" }} .Error {{ "}}" }} | Error | The error message describing why authentication failed |
Examples
Custom login page with username form
Custom login page with username form
This template provides a branded login page where users enter their username to initiate HYPR
passwordless authentication. The form posts to
{{ .LoginURL }} and passes {{ .RedirectURL }}
as a hidden field so the user returns to their original destination after login.login.html
Custom interstitial page with device authentication polling
Custom interstitial page with device authentication polling
This template displays a waiting screen while the user authenticates on their HYPR mobile device.
It uses JavaScript to poll the status check URL and automatically redirects the user once
authentication completes. A dynamic link fallback is provided for users who cannot scan the QR code.
interstitial.html
Custom error page for authentication failures
Custom error page for authentication failures
This template displays a user-friendly error message when HYPR authentication fails. It renders
the error message provided by the Orchestrator and gives the user an option to retry.
error.html
Troubleshooting
- Verify the HYPR domain is accessible from the Orchestrator host — ensure the domain is correct and reachable
- Ensure the App ID matches exactly what is configured in the HYPR Control Center — mismatched app IDs cause authentication failures
- Check that the access token is valid — expired or revoked tokens will prevent the connector from communicating with HYPR
- QR code not displaying — confirm that the QR Authentication toggle is enabled in the Console or that the equivalent setting is configured in YAML
Related Pages
Identity Fabric
Overview of all identity providers
Generic OIDC
Generic OpenID Connect connector
Okta
OIDC connector for Okta
Microsoft Entra ID
OIDC connector for Microsoft Entra ID