Connect an AI agent to a service account
Early Access release
Connect an AI agent to a service account that's managed in Okta Privileged Access. Because this method uses username and password credentials to grant access to AI agents, it's the least secure choice and isn't recommended.
Before you begin
- You have the super admin and Okta Privileged Access security admin roles.
- You've added the Okta Privileged Access OIN app to your Okta org. See Set up Okta Privileged Access.
- You've registered an AI agent in your org. See Register an AI agent.
- You've configured the service account that you want to use. See Manage service accounts.
- You've created a project in Okta Privileged Access and assigned it to the service account. See Projects and Resource assignment.
Start this task
-
In the Admin Console, go to .
- Select a registered AI agent.
- Select the Managed connections tab.
- Click Add connection. The Add connection page opens.
- Select the Service account resource type.
- Select an app and a service account.
- Accept or modify the Resource Indicator. This is the identifier that the AI agent uses when it requests the secret from Okta.
- Click Add. On the Managed connections tab, the service account appears as a connected resource.
Related topics
Connect an AI agent to an authorization server
