Skip to content
Last updated

Okta integration

Okta is an identity and access management platform that provides authentication, user management, and authorization services. Integrating Okta with Frontegg allows your application to list users, manage groups, access applications, and read system logs on behalf of your users using OAuth 2.0.


Prerequisites

Connect Okta

Step 1: Open the Okta Admin Console

Sign in to your Okta Admin Console. The URL follows the format https://{yourOktaDomain}-admin.okta.com/admin/dashboard. Your Okta domain is visible in the browser address bar — for example, if your URL is https://acme-admin.okta.com, your domain is acme.okta.com.

Okta Admin Console dashboard

Step 2: Open the Applications list

In the left navigation, click ApplicationsApplications. The Applications page lists all app integrations registered in your Okta org.

Click Create App Integration to start the wizard.

Okta Applications page with Create App Integration highlighted

Step 3: Select the sign-in method and application type

In the Create a new app integration dialog:

  1. Under Sign-in method, select OIDC - OpenID Connect.
  2. Under Application type, select Web Application.

Click Next.

Create a new app integration dialog with OIDC and Web Application selected

Step 4: Fill in the app integration settings

Complete the New Web App Integration form:

  • App integration name — Enter a descriptive name, for example Frontegg Integration.
  • Grant type — Under Core grants, keep Authorization Code checked (required). Also check Refresh Token.
  • Sign-in redirect URIs — Replace the default value with the following URI:
    • https://YOUR_MCP_GATEWAY_URL/integration-callback
  • Controlled access — Select Skip group assignment for now.

New Web App Integration form filled in

Step 5: Review the redirect URIs

Confirm that the Frontegg redirect URI appears in the Sign-in redirect URIs section before saving.

Sign-in redirect URIs section showing the Frontegg callback URL

Click Save.

Step 6: View the app details page

After saving, Okta redirects you to the app details page for Frontegg Integration. This confirms the app was created successfully.

Frontegg Integration app details page

Step 7: Copy your credentials

On the General tab, scroll to the Client Credentials section:

  • Client ID — Copy the value shown in the Client ID field.
  • Client Secret — Under CLIENT SECRETS, click the copy icon next to the masked secret value to copy it to your clipboard.

Copy your Client Secret now

The Client Secret is masked after creation. Use the copy icon to retrieve it. If you lose it, click Generate new secret to create a replacement.

Client Credentials section showing Client ID and masked Client Secret

Configure the Frontegg portal

Once you have obtained your Client ID and Client Secret from the steps above, configure the integration in the Frontegg portal:

  1. Open the Frontegg portal and navigate to [ENVIRONMENT] → Integrations → Okta.
  2. Enter your Okta domain — the hostname of your Okta org. For example, if your admin console URL is https://acme-admin.okta.com, your domain is acme.okta.com.
  3. Enter the Client ID and Client Secret in the corresponding fields.
  4. Select the required scopes:
ScopeDescription
openidRequired for OpenID Connect authentication
profileAccess user profile information
emailAccess user email address
phoneAccess user phone number
addressAccess user address
offline_accessObtain refresh tokens for long-lived access
okta.users.readRead user information
okta.users.manageCreate, update, and deactivate users
okta.groups.readRead group information
okta.groups.manageCreate, update, and delete groups
okta.apps.readRead application information
okta.apps.manageManage applications
okta.authorizationServers.readRead authorization server information
okta.authorizationServers.manageManage authorization servers
okta.logs.readRead system log events
  1. Click Save.

Keep your credentials secure

Never share or commit your Client Secret to version control.

Additional resources