On This Page
In the General Settings section:
Name — Enter the name that you would expect to see on a button, such as Sign in with MyIdentityProvider.
Client Id — Paste the app ID or client ID that you obtained when you configured the Identity Provider in the previous section.
Client Secret — Paste the secret that you obtained in the previous section.
Scopes — Leave the defaults. These scopes are included when Okta makes an OpenID Connect request to the Identity Provider.
By default, Okta requires the
emailattribute for a user. Theemailscope is required to create and link the user to Okta's Universal Directory. If your Identity Provider doesn't support this attribute, you can make it optional. See Manage User Profiles.
In the Endpoints section:
Add the following endpoint URLs for the OpenID Connect Identity Provider that you are configuring. You can obtain the appropriate endpoints and the required scopes in the well-known configuration document for the Identity Provider (for example, https://{theIdPdomain}/.well-known/openid-configuration). See the Well-known configuration URLs section for URL details for the Identity Providers that we support.
- Issuer — The identifier of the OpenID Connect provider. For example, where you created the Identity Provider app:
https://{theIdPdomain}/ - Authorization endpoint — The URL of the Identity Provider's OAuth 2.0 authorization endpoint. For example:
https://{theIdPdomain}/oauth2/v1/authorize - Token endpoint — The URL of the Identity Provider's token endpoint for obtaining access and ID tokens. For example:
https://{theIdPdomain}/oauth2/v1/token - JWKS endpoint — The URL of the Identity Provider's JSON Web Key Set document. This document contains signing keys that are used to validate the signatures from the provider. For example:
https://{theIdPdomain}/oauth2/v1/keys - Userinfo endpoint — The endpoint for getting identity information about the user. For example:
https://{theIdPdomain}/oauth2/v1/userinfo
Well-known configuration URLs
IdP — AWS Cognito User Pools
Well-Known Configuration URL — https://cognito-idp.{region}.amazonaws.com/{userPoolId}/.well-known/openid-configuration
Details — In the URL, replace {region} and {userPoolId} with the appropriate values.
IdP — Intuit
Well-Known Configuration URL — https://developer.intuit.com/.well-known/openid-configuration/
IdP — Line
Well-Known Configuration URL — https://access.line.me/.well-known/openid-configuration
IdP — Microsoft Azure AD
Well-Known Configuration URL — https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
Details — In the URL, replace {tenant} with the appropriate value.
IdP — PayPal
Well-Known Configuration URL — https://www.paypal.com/.well-known/openid-configuration
Details — Use this /userinfo endpoint, as it returns a well-formatted email for Okta to consume: https://api.sandbox.paypal.com/v1/identity/openidconnect/userinfo/?schema=openid
IdP — Salesforce
Well-Known Configuration URL — https://login.salesforce.com/.well-known/openid-configuration
IdP — TrustedKey
Well-Known Configuration URL — https://wallet.trustedkey.com/.well-known/openid-configuration
IdP — Twitch
Well-Known Configuration URL — https://id.twitch.tv/oauth2/.well-known/openid-configuration
IdP — Yahoo
Well-Known Configuration URL — https://login.yahoo.com/.well-known/openid-configuration
Details — It is necessary to include the sddp-w scope during app creation at developer.yahoo.com.