You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Provide the email `domains` of your organization on the connector `experience` tab. This will enabled the SSO connector as an authentication method for those users.
75
+
Scopes define the permissions your app requests from users and control which data your app can access from their Microsoft Entra ID accounts. Requesting Microsoft Graph permissions requires configuration on both sides:
76
+
77
+
**In Microsoft Entra admin center:**
78
+
79
+
1. Navigate to **Microsoft Entra ID > App registrations** and select your application.
80
+
2. Go to **API permissions > Add a permission > Microsoft Graph > Delegated permissions**.
81
+
3. Select only the permissions your app requires:
82
+
- OpenID permissions:
83
+
-`openid` (Required) - Sign users in
84
+
-`profile` (Required) - View users' basic profile
85
+
-`email` (Required) - View users' email address
86
+
-`offline_access` (Optional) - Required only if you enable **Store tokens for persistent API access** in the Logto connector and need to obtain refresh tokens for long-lived access to Microsoft Graph APIs.
87
+
- API access (Optional): Add any additional permissions needed for your app. Common Microsoft Graph permissions include `Mail.Read`, `Calendars.Read`, `Files.Read`, etc. Browse the [Microsoft Graph permissions reference](https://docs.microsoft.com/en-us/graph/permissions-reference) to find available permissions.
88
+
4. Click **Add permissions** to confirm the selection.
89
+
5. If your app requires admin consent for certain permissions, click **Grant admin consent for [Your Organization]**.
90
+
91
+
<center>
92
+
<imgsrc={permissions}alt="Add Microsoft API permissions" />
93
+
</center>
94
+
95
+
**In Logto Microsoft Entra ID connector:**
96
+
97
+
1. Logto automatically includes `openid`, `profile`, and `email` scopes to retrieve basic user identity information. You can leave the `Scopes` field blank if you only need basic user information.
98
+
2. Add `offline_access` to the `Scopes` field if you plan to store tokens for persistent API access. This scope enables refresh tokens for long-lived API access.
99
+
3. Add additional scopes (separated by spaces) in the `Scopes` field to request more data from Microsoft Graph. Use standard scope names, for example: `User.Read Mail.Read Calendars.Read`
100
+
101
+
**Tip**: If your app requests these scopes to access the Microsoft Graph API and perform actions, make sure to enable **Store tokens for persistent API access** in Logto Microsoft Entra ID connector. See the next section for details.
102
+
103
+
</Step>
104
+
105
+
106
+
<Stepindex={3}title="Store tokens to access Microsoft APIs (Optional)">
107
+
108
+
If you want to access [Microsoft Graph APIs](https://docs.microsoft.com/en-us/graph/api/overview) and perform actions with user authorization, Logto needs to get specific API scopes and store tokens.
109
+
110
+
1. Add the required scopes in your Microsoft Entra admin center API permissions configuration and Logto Microsoft Entra ID connector.
111
+
2. Enable **Store tokens for persistent API access** in Logto Microsoft Entra ID connector. Logto will securely store Microsoft access and refresh tokens in the Secret Vault.
112
+
3. To ensure refresh tokens are returned, add the `offline_access` scope to your Microsoft Entra ID application permissions and include it in your Logto Microsoft Entra ID connector scopes. This scope allows your application to maintain access to resources for extended periods.
113
+
114
+
</Step>
115
+
116
+
117
+
<Stepindex={4}title="Set email domains and enable the SSO connector">
118
+
119
+
Provide the email `domains` of your organization on the connector `experience` tab. This will enable the SSO connector as an authentication method for those users.
75
120
76
121
Users with email addresses in the specified domains will be exclusively limited to use your SSO connector as their only authentication method.
Use the `Scope` field to add additional scopes to your OAuth request. This will allow you to request for more information from the Okta OAuth server. Please refer to the [Okta documentation](https://developer.okta.com/docs/reference/api/oidc/#scopes) for more details about the available scopes.
69
+
Scopes define the permissions your app requests from users and control which data your app can access from their Okta accounts. Requesting additional Okta permissions requires configuration on both sides:
70
70
71
-
\*Regardless of the custom scope settings, Logto will always send the `openid`, `profile` and `email` scopes to the IdP. This is to ensure that Logto can retrieve the user's identity information and email address properly.
71
+
**In Okta admin console:**
72
+
73
+
1. Navigate to **Applications > Applications** and select your OIDC application.
74
+
2. Go to the **Assignments** tab to ensure your app has access to the required users and groups.
75
+
3. For custom scopes, navigate to **Security > API > Authorization Servers** and select your authorization server.
76
+
4. Add custom scopes if needed:
77
+
- Click **Scopes** and then **Add Scope**
78
+
- Define scope names like `okta.users.read` or `okta.groups.read` for accessing Okta APIs
79
+
- Configure consent requirements for each scope
80
+
81
+
For a complete list of available scopes and their descriptions, please refer to the [Okta OIDC documentation](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/#scopes).
82
+
83
+
**In Logto Okta connector:**
84
+
85
+
1. Logto automatically includes `openid`, `profile`, and `email` scopes to retrieve basic user identity information. You can leave the `Scopes` field blank if you only need basic user information.
86
+
2. Add `offline_access` to the `Scopes` field if you plan to store tokens for persistent API access. This scope enables refresh tokens for long-lived API access.
87
+
3. Add additional scopes (separated by spaces) in the `Scopes` field to request more data from Okta. For example: `okta.users.read okta.groups.read`
88
+
89
+
**Tip:** If your app requests these scopes to access Okta APIs and perform actions, make sure to enable **Store tokens for persistent API access** in Logto Okta connector. See the next section for details.
90
+
91
+
</Step>
92
+
93
+
<Stepindex={5}title="Store tokens to access Okta APIs (Optional)">
94
+
95
+
If you want to access [Okta scopes](https://developer.okta.com/docs/guides/request-user-consent/main/#enable-consent-for-scopes) and perform actions with user authorization, Logto needs to get specific scopes and store tokens.
96
+
97
+
1. Add the required scopes in your Okta developer console API permissions configuration and Logto Okta connector.
98
+
2. Enable **Store tokens for persistent API access** in Logto Okta connector. Logto will securely store Okta access and refresh tokens in the Secret Vault.
99
+
3. To ensure refresh tokens are returned, add the `offline_access` scope to your Okta application permissions and include it in your Logto Okta connector scopes. This scope allows your application to maintain access to resources for extended periods.
72
100
73
101
</Step>
74
102
75
-
<Stepindex={5}title="Set email domains and enable the SSO connector">
103
+
<Stepindex={6}title="Set email domains and enable the SSO connector">
76
104
77
-
Provide the email `domains` of your organization on the connector `experience` tab. This will enabled the SSO connector as an authentication method for those users.
105
+
Provide the email `domains` of your organization on the connector `experience` tab. This will enable the SSO connector as an authentication method for those users.
78
106
79
107
Users with email addresses in the specified domains will be exclusively limited to use your SSO connector as their only authentication method.
0 commit comments