On this page
Self-service registration
Note: In proxy model architectures, where a server-side application using the Embedded SDK is used as a proxy between client applications and Okta servers, a request context for the client applications is required. Security enforcement is expected to be based on the client request context's IP address and user agent. However, since these values are currently being derived from the server application rather than the client, this enforcement is not available. As a result, network zones or behaviors that drive their conditions based on these request context values (geolocation, IP Address, or user agent) will not work until we can find a solution to the issue.
This guide covers self-service registration, which allows users to sign up for the app themselves. In this use case, the user must register with a password, email, and/or phone factors. You must first enable the self-service registration option for your app in the Okta org and then build the self-service registration flow in your app.
Learning outcomes
- Configure your Okta org for self-service registration.
- Set up the password, email, and/or phone authentication factors.
- Set up and send a verification email during new user registration.
What you need
- An app that uses the embedded Okta Identity Engine SDK
- Okta org already configured for a multifactor use case
- Identity Engine SDK set up for your own app
Sample code
Configuration updates
Before you can build the self-registration flow in your app, you must configure the Okta org to accept self-registration with the password, email, and/or phone factors. See Set up your Okta org for a multifactor use case to set up the password, email, and phone factors in your Okta org.
In addition to setting up the authentication factors, you also need to configure the following in your Okta org:
- Update the profile enrollment default policy
- Confirm that the org application is assigned to everyone
- Set the Email and Phone authenticators as optional enrollment factors
1: Update the profile enrollment default policy
Enable self-registration in your profile enrollment default policy:
- In the Admin Console, select Security > Profile Enrollment from the left-hand navigation pane.
- On the Profile Enrollment page, click the pencil icon next to the Default Policy.
- On the Default Policy page, under Profile Enrollment, click Edit.
- In the Profile Enrollment section, select Allowed for Self-service registration.
- Click Save.
Note: See Managed Profile Enrollment policies (opens new window) for additional profile enrollment policy options.
2: Confirm that the org application is assigned to everyone
For new user registration, your app in your Okta org needs to be assigned to everyone.
- In the Admin Console, select Applications > Applications from the left-hand navigation pane.
- On the Applications page, select your application.
- On your application page, select the Assignments tab.
- From the left, click the Groups filter.
- Confirm that the Everyone group appears in the Assignment list.
3: Set the Email and Phone authenticators as optional enrollment factors
- In the Admin console, select Security > Authenticators from the left-hand navigation pane
- On the Authenticators page, click the Enrollment tab.
- In Default Policy, click Edit.
- Under the Effective factors section of the Edit Policy dialog box, set both email and phone authenticators to optional for enrollment:
- Set Email Authentication to Optional.
- Set Phone Authentication to Optional.
- Click Update Policy.
Summary of steps
Integration steps
Send a confirmation email during new user registration with only the password factor required
Even when only the password factor is required for an Okta application, you can still send a confirmation email.
Set up
In this scenario, the org is set up in the following manner:
The org is initially configured following the steps described in Set up your Okta org for a multifactor use case.
The application's authentication policy is updated for only the password factor. In the Admin Console, the AND User must authenticate with field is set to Password.
The Email verification field in the profile enrollment's Default Policy is set to Required before access is granted. You can find the profile enrollment configuration by navigating to Security > Profile Enrollment.
The Initiate login URI field is set to the sign-in URI in the application settings. By setting this value, the email verification link for new user enrollment redirects the user to the URL provided in the Initiate login URI field.
Flow behavior
During new user registration, there are no factors required other than the password. However, email verification is set to Required in the profile enrollment configuration. In this case, the user is sent an email using the following email template: Registration - Activation.
The user clicks the link in the activation email and is redirected to the sample app's home page.