This page is out of date/deprecated and is under construction. Check back soon for updated instructions on using OIDC.
For more detailed integration steps, see Keycloak with Okta OpenID Connect Provider.
- Ensure you have completed the steps in Simple login flow.
- Start creating th eOIDC Identity Provider integration in the Keycloak.
- In Okta, create a new OpenID connect application integration and use PUBLIC (make sure it’s not a localhost) redirect uri as a login URL in Okta form.
- Copy the Client ID and Client Secret from Okta into the Keycloak’s configuration.
- Under Client Authentication, select Client Secret Sent as POST.
- By default, use
https://{OKTA-DOMAIN}/oauth2/default/v1/authorize
andhttps://{OKTA-DOMAIN}/oauth2/default/v1/token
as authorization and token endpoints, respectively. - Set
openid profile email
as default scopes.