OAuth2 App Consent Granted

Webhook Event: Starts flow when an OAuth2 App is granted consent by a user in Okta.(app.oauth2.as.consent.grant)

Scopes

See Event cards for the list of required OAuth scopes needed by this card.

Output

Field Definition Type

Date & Time

Date and time the event was triggered in Okta API.

Text

Message

Message details about the event.

Text

Event ID

Event's unique identifier key.

Text

Event Type

Type of event that was published.

Text

Event Time

Time stamp when the notification was delivered to the service.

Text

Version

Versioning indicator.

Text

Actor

ID

Unique identifier of the Okta actor who granted the consent.

Text

Alternate ID

Email address of the Okta actor.

Text

Display Name

Display name of the Okta actor.

Text

Type

Type of Okta actor

Text

Target

ID

Unique identifier of the scope granted.

Text

Display Name

Display name of the scope granted.

Text

Type

Type of the scope granted.

Text

Detail Entry

Details of the scope granted.

Text

UUID

Webhook event's universal unique identifier.

Text

Event Details

Raw JSON payload returned from the Okta API for this particular event.

Object

Headers

Object representing the headers for the response; each key of the header will be parsed into a header string as "key: value" (Content-Type: text/plain).

Object

Source

Source of user-specific data.

Text

Debug Context

Debug Data

Information on the triggered event used for debugging. For example, returned data can include a URI, an SMS provider, or transaction ID.

Object

While you can create more user or group fields for an Okta event, the Okta API only returns values for four fields: ID, Alternate ID, Display Name, and Type.

No other fields are supported for users or groups, and this event card doesn't return data from such fields.

Currently OAuth Consent works only with a custom authorization server. Okta provides a pre-configured custom authorization server called default. It includes a basic access policy and a rule to quickly get you started. For simple use cases, this out-of-the-box custom authorization server is usually all that you need. The user can also create and configure their own authorization server.

In order to use custom authorization servers, Okta's API Access Management product must be enabled for the org. That means enabling the following feature flags:

API_ACCESS_MANAGEMENT

API_ACCESS_MANAGEMENT_CONSENT

API_ACCESS_MANAGEMENT_EXTENSIBILITY (optional)

If it's an OIE org, the following feature flag must also be enabled.

ENG_OIE_CONSENT

Related topics

Okta connector

Workflow elements

Guidance for Okta connector

Okta API documentation