AI agent resource connections
After you've created and registered an AI agent in your org, you can define the resource that they can access. For some resource types, you can limit the scopes that are minted into the tokens. To understand which resource types best fits your use case, see Compare AI agent resource types.
You can add resource connections to these resource types. Each resource type has configuration tasks that you must complete before you can connect it to an AI agent:
| Resource type |
Description |
Configuration tasks |
|---|---|---|
| Authorization server | Grants the AI agent access to resources that are protected by an Okta custom authorization server. |
|
| Secret | Uses a static credential for a downstream resource that has been vaulted in Okta Privileged Access. |
Configure the vaulted secret that you want to use. See Okta Privileged Access user guide.
|
| Service account | Uses a static credential for an app that's specified in the Universal Directory. This resource is vaulted in Okta Privileged Access. |
|
| Application | Uses OAuth client credentials for a custom or third-party resource server. |
Configure the resource server connector for the app that you want to use. See Configure a resource server connector. Or, create a custom resource server. See Add custom resource servers.
|
| MCP server | Grants the AI agent access to resources that are protected by a custom or third-party MCP server. |
Add the MCP server that you want to use. See Add MCP servers.
|
Next step