Skip to content

Commit 6a5b079

Browse files
authored
Merge branch 'main' into okta-hosted-sign-in-widget
2 parents 29ad771 + 5f02f0f commit 6a5b079

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

_source/_posts/2023-07-28-oidc_workshop.md

+4-6
Original file line numberDiff line numberDiff line change
@@ -519,16 +519,14 @@ Open the model for `Org`, press the green **Add record** button, and press the g
519519

520520
1. **Domain** - Enter the domain name of this organization. It should match the domain name of the email address they'll use. For example, if your customer's organization domain is `whiterabbit.fake`, the domain record is "whiterabbit.fake". Since we are testing with made-up customers, use the email domain you used when you signed up for the Okta Developer Edition organization.
521521
1. **Client ID** and **Client Secret** - Fill out the `client_id` and `client_secret` for the org with ID 1, using the values from Okta.
522-
2. **Issuer** - In the "Security" section of the sidebar in the Okta Admin Console, navigate to **API**. This page lists the Issuer URI for the Okta organization, which goes into the app's database for that org as its `issuer`.
523-
3. **Authorization endpoint** and **Token endpoint** - On the same page in the Okta Admin console as the issuer, click the name of the default authorization server, find the **Metadata URI**. This URI will be of the form `your-dev-account-id.okta.com/oauth2/default/.well-known/oauth-authorization-server`. Click on the URI to open it in the browser where you will see data in JSON format. From this authorization server metadata, copy the `authorization_endpoint` to the `authorization_endpoint` field in your app's database. Copy the `token_endpoint` to the corresponding field in the database as well.
524-
4. **Userinfo endpoint** - To find the `userinfo_endpoint`, replace the string `oauth-authorization-server` in the metadata URL with `openid-configuration`, and copy the `userinfo_endpoint` from the resulting page to the database.
522+
2. **Issuer**, **Authorization endpoint**, and **Token endpoint** - Visit your Okta org authorization server **Metadata URI** directly through the browser by visiting this URL `https://{yourOktaOrg}/.well-known/openid-configuration`be sure to add your specific Okta org URL. For more information, refer to this documentation on the [Okta org authorization server](https://developer.okta.com/docs/concepts/auth-servers/#org-authorization-server). From this authorization server metadata, copy the `issuer` to the `issuer` field, then the `authorization_endpoint` to the `authorization_endpoint` field in your app's database, and finally the `token_endpoint` to the corresponding field in the database as well.
525523

526524
After this step, your database should contain the `client_id` and `client_secret` unique to the OIDC app that you made in Okta. All endpoint fields will start with the Okta organization's domain.
527525

528526
Check that each value is in the right database field. The subdomain of each URL will have your Okta dev account's ID in it, and:
529-
- The `userinfo_endpoint` ends with `/oauth2/default/v1/userinfo`
530-
- The `token_endpoint` ends with `/oauth2/default/v1/token`
531-
- The `authorization_endpoint` ends with `/oauth2/default/v1/authorize`
527+
- The `userinfo_endpoint` ends with `/oauth2/v1/userinfo`
528+
- The `token_endpoint` ends with `/oauth2/v1/token`
529+
- The `authorization_endpoint` ends with `/oauth2/v1/authorize`
532530

533531
Save the database changes in Prisma, and the first customer's OpenID configuration is ready to go!
534532

0 commit comments

Comments
 (0)