Overview

On This Page

If you are building a server-side (or web) application that is capable of securely storing secrets, then the authorization code flow is the recommended method for controlling access to it.

Note: Some browsers have begun blocking third-party cookies by default, disrupting Okta functionality in certain flows. See FAQ: How Blocking Third Party Cookies Can Potentially Impact Your Okta Environment.

At a high-level, this flow has the following steps:

  • Your application directs the browser to the Okta sign-in page, where the user authenticates.
  • The browser receives an authorization code from your Okta Authorization Server.
  • The authorization code is passed to your application.
  • Your application sends this code to Okta, and Okta returns access and ID tokens, and optionally a refresh token.
  • Your application can now use these tokens to call the resource server (for example an API) on behalf of the user.

See our OAuth 2.0 overview for more information on the Authorization Code flow, including why to use it.

Support

If you need help or have an issue, post a question in our Developer Forum.