Okta integration using OpenID Connect Provider (OIDC)¶
Note
For more detailed integration steps, see Keycloak with Okta OpenID Connect Provider.
Follow these steps to integrate Okta using OIDC:
- Ensure you have completed the steps in Simple login flow.
- Start creating th eOIDC Identity Provider integration in the Keycloak.
- In Okta, create a new OpenID connect application integration and use PUBLIC (make sure it’s not a localhost) redirect uri as a login URL in Okta form.
- Copy the Client ID and Client Secret from Okta into the Keycloak’s configuration.
- Under Client Authentication, select Client Secret Sent as POST.
- By default, use
https://{OKTA-DOMAIN}/oauth2/default/v1/authorize
andhttps://{OKTA-DOMAIN}/oauth2/default/v1/token
as authorization and token endpoints, respectively. - Set
openid profile email
as default scopes.