Add a no-auth app to Access Gateway

The purpose of this tutorial is to walk through the process of setting up a no-auth application through the Access Gateway Admin UI console

Before You Begin

Ensure that:

Create the no-auth application in Access Gateway

  1. Sign in to the Access Gateway Admin UI console.
  2. Click the Applications tab.

  3. Click +Add to add a new application.

  4. Select the No-auth application type from the list available in the left section of the page and click Create.

    The New Protected Application wizard will start and display the Setting tab for the application being added.

Configure the no-auth application settings

  1. The Settings page provides options to configure the application. Review the options and make the appropriate changes.
    SeeAbout application settingsfor more information on the application settings options.
  2. Enter the following values in their respective fields, and click Next.
    Protected Web Resource https://header.service.gateway
    Post Login URL
    Groups Select the IDP group that can access this application.
  3. Important Note


    While optional, Okta recommends that all applications include certificates.
    See About Access Gateway certificates for general information about certificate.
    See Certificate management tasks for a general task flow for obtaining and assigning certificates.  

  4. Expand the Certificates tab.


    By default a wildcard self signed certificate is created and assigned to the application when the application is initially created.

  5. Optional. Click Generate self-signed certificate

    A self-signed certificate is created and automatically assigned to the application.
  6. Optional. Select an existing certificate from the list of provided certificates.
    Use the Search field to narrow the set of certificates by common name.
    Use the page forward (>)and backward(<) arrows to navigate through the list of available certificates.

  7. Click Next. The Attributes pane appears.
  8. The Attributes page provides a list of attributes that are passed into the application. This page also provides the ability to add, edit, or remove any attribute.
    See Application attributes for more information on the attribute optionsApplication attributes

  9. Add any required attributes, and click Next. The Policies pane appears.

  10. The Policies pane provides a list of protection policies (if any exist) for the application.
    Leave all policies unchanged and click Done.
    See Managing application policy for more information on application policies.


  • Make sure that the public domain defined in Essentials section is added to the local hosts file pointing to the machine that hosts Access Gateway. For example, the application in this example has been created using the public domain: header.service.gateway. In order to access this, you must add to the local hosts file where is the IP address of the machine that hosts Access Gateway.

  • When testing, note that the address bar changes the Header Local URL to the Public Domain URL (in this example,

Test the application

The following steps assign the application to a test account and then execute the application to verify basic functionality.

Assign the application

  1. Sign in to your Okta tenant as an administrator.

  2. In the Admin Console, go to Applications > Applications.

  3. Click the name of the newly added header application.

  4. Select the Assignments tab.

  5. Select .Assign > Assign To People.

  6. Select an appropriate user and click Assign.



    Testing is typically initially done using the same user who is associated with administering Access Gateway.

  7. Click Done.

Execute the application

  1. Return to the Access Gateway Admin UI console.

  2. On the row representing the newly added no-auth app, select Goto application > SP Initiated.

    Use goto application > SP Initiated menu to test the no-auth application.

  3. Verify the Results page displays all expected attribute values.
  4. Close the Results page.
  5. On the Results page, review and verify that No-auth App sent the expected profile information.



If the application is configured properly, you will be able to access this Protected Web Resource using the Public Domain address configured in the Access Gateway app.


Related topics