Add a no-auth app to Access Gateway


The purpose of this tutorial is to walk through the process of setting up a no-auth application through the Access Gateway AdminAn abbreviation of administrator. This is the individual(s) who have access to the Okta Administrator Dashboard. They control the provisioning and deprovisioning of end users, the assigning of apps, the resetting of passwords, and the overall end user experience. Only administrators have the Administration button on the upper right side of the My Applications page. Console.

Create the No-auth Application in Access Gateway

  1. Navigate to your Access Gateway InstanceAn instance, or computer instance, is a virtual machine (VM) or individual physical computer, used to host a software appliance. and sign in as admin.
  2. Click the Applications tab
    .Select applications tab
  3. Click + Add to add a new application.
    Click Add.
  4. Select the No-auth application type from the list available in the left section of the page, and click Create.

    The New Protected Application wizard will start and display the Setting tab for the application being added.

Configure the No-auth Application Settings

  1. The Settings page provides options with which to configure the application. Review the options and make the appropriate changes.
    For more information on the application settings options, seeApplication Settings
  2. Enter the following values in their respective fields, and click Next.
    Public DomainA domain is an attribute of an Okta organization. Okta uses a fully-qualified domain name, meaning it always includes the top-level domain (.com, .eu, etc.), but does not include the protocol (https)
    Protected Web Resource https://header.service.gateway
    Post Login URL
    Groups Select IDP group that should be able to access this application.
  3. Review the Essentials page and then click Next.
    The Attributes pane appears.
  4. The Attributes page provides a list of attributes that will be passed into the application.
    This page also provides the ability to add, edit, or remove any attribute.
    Add any required attributes, and click Next.
    For more information on the attribute options, see Application Attributes

    The Policies pane appears.

  5. The Policies pane provides a list of protection policies (if any exist) for the application.
    Leave all policies unchanged and click Done.
    For more information on Application policies see Application Policy Overview and Administration User Policy Guide.



  • Make sure that the public domain defined in Essential section is added to the local hosts file pointing to the machine that hosts Access Gateway. For example, the application in this example has been created using the public domain: header.service.gateway. In order to access this, you must add to the local hosts file where is the IP address of the machine that hosts Access Gateway.

  • When testing, note that the address bar changes the Header Local URL to the Public Domain URL (in this example,

Test the Application

The following steps assign the application to a test account and then execute the application to verify basic functionality.

Assign the application

  1. Login to your Okta tenant as administrator.

  2. Select Application > Applications.

  3. Click the name of the newly added header application..

  4. Select the Assignments tab.

  5. Select .Assign > Assign To People.

  6. Select an appropriate user and click Assign.



    Testing is typically initially done using the same user who is associated with administering Access Gateway

  7. Click Done.

Execute the Application

  1. Return to the Access Gateway admin console.

  2. On the row representing the newly added no-auth appAn abbreviation of application. Essentially, it is a web-based site used to perform any number of specific tasks, and requires authentication from end users by signing in., select Goto application > SPAn acronym for service provider. Generally, an SP is a company, usually providing organizations with communications, storage, processing, and a host of other services. Within Okta, it is any website that accepts SAML responses as a way of signing in users, and has the ability to redirect a user to an IdP (e.g., Okta) to begin the authentication process. Initiated.

    Use goto application > SP Initiated menu to test the no-auth application.

  3. Verify the results page displays all expected attribute values.
  4. Close the results page.
  5. On the Results page, review and verify that No-auth App sent the expected profile information.



If the application is configured properly, you will be able to access this Protected Web Resource via the Public Domain address configured in the Access Gateway App.


Next Steps