Authorization
Authorize this connector by creating a connection to your Okta account. You can reuse this connection the next time that you build a flow with this connector. If you want to create a new connection for a different Okta org, see the Authorize an account from another Okta org.
For additional information, see Guidance for Okta connector.
Create a connection from the current Okta org
-
In the Okta Workflows Console, go to Connections.
-
Click New Connection. All available connectors appear.
-
Select the Okta connector. New Connection window appears.
-
In the New Connection window, enter the Connection Nickname. This is the display name you want to appear in your list of connections.
-
Enter Domain, Client ID, and Client Secret.
-
Click Create.
The new connection appears in the Connections list.
Authorize an account from another Okta org
Create a new connection for an Okta org different from your current org using the following procedures:
-
Create an OpenID Connect web app in the target Okta org.
-
Configure the OpenID Connect web app.
-
Authorize an account from the target Okta org.
If you want to create a new connection for the current Okta org, see the section Authorize an account from the current Okta org.
Create an OpenID Connect web app in the target Okta org
-
In the Okta Admin Console of your target Okta org, go to Applications > Applications.
-
Click Create App Integration.
-
In the Create a new app integration window, select OIDC - OpenID Connect for the Sign-on Method, and set the Application type to Web application. Click Next. New Web App Integration page appears.
-
On the page, enter your Application name. This is the app display name.
-
Enter the Sign-in redirect URIs for the app. Note that you must enter the URI for the location where the app resides, not the target org. For example, to connect to an Okta Preview org from a Production org, use https://oauth.workflows.okta.com/oauth/okta/cb.
-
Click Save.
The app is created and appears on the Applications page.
Configure the OpenID Connect web app
-
In the Okta Admin console, go to Applications > Applications.
-
Select your newly created application.
-
On the General tab, click Edit.
-
In the Allowed Grant Types list, select Refresh Token.
-
Click Save.
-
Select the Assignments tab, and then click Edit.
-
Assign the app to the appropriate users. You can assign it to individual people or to groups. Note: The user must be a Super Admin.
-
Save your assignments.
-
On the Okta API Scopes tab, grant consent for the scopes required for your use cases. See List of available scopes in the Okta connector.
-
Click Save.
The app is now configured and an assigned user can create a new connection for this org.
Authorize an account from the target Okta org
To perform this procedure:
-
You must be assigned to the OpenID Connect web app created in the previous procedures.
-
You must have Super Admin credentials.
You also need the following information for authorizing your Okta account:
-
Domain: Your Okta org domain. If the URL of your Okta org is https://yourcompany.okta.com, then your domain is yourcompany.okta.com.
-
Client ID and Client Secret: The client ID and client secret from your OAuth2 app. To find this, in the Okta Admin Console, go to Applications > Applications > Your OpenID Connect web app > Sign On tab > Sign On Methods.
-
In the Okta Workflows Console, go to Connections.
-
Click New Connection. All available connectors appear.
-
Select the Okta connector. New Connection window appears.
-
In the New Connection window, enter the Connection Nickname. This is the display name you want to appear in your list of connections.
-
Enter Domain, Client ID, and Client Secret.
-
Click Create.
The new connection appears in the Connections list.