You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update README.md to reference Integrator accounts during setup. (#516)
* Update README.md to reference Integrator accounts during setup.
* Include steps to setup authorization server.
---------
Co-authored-by: jcavazos <jcavazos@itpops.com>
* An Okta Developer Account (create one using `okta register`, or configure an existing one with `okta login`)
7
+
Before you begin, you’ll need an Okta Integrator Free Plan account. To get one, sign up for an [Integrator account](https://developer.okta.com/login). Once you have an account, sign in to your [Integrator account](https://developer.okta.com/login). Next, in the Admin Console:
8
+
9
+
1. Go to **Applications > Applications**
10
+
2. Click **Create App Integration**
11
+
3. Select **OIDC - OpenID Connect** as the sign-in method
12
+
4. Select **Single-Page Application** as the application type, then click **Next**
13
+
5. Enter an app integration name
14
+
6. In the **Grant type** section, ensure both **Authorization Code** and **Refresh Token** are selected
8. In the **Controlled access** section, select the appropriate access level
19
+
9. Click **Save**
11
20
12
21
## Configure Okta resources
13
22
@@ -17,13 +26,47 @@ Sign into your [Okta Developer Edition account](https://developer.okta.com/login
17
26
18
27
**Verify Authorization Server**
19
28
20
-
This repo calls a custom resource server to demonstrate making a protected resource request using an access token. Ensure that your default custom authorization server has an access policy. Add an access policy if it's not there. See [Create access polices](https://help.okta.com/okta_help.htm?type=oie&id=ext-create-access-policies).
29
+
When using a custom authorization server, you need to set up authorization policies. Complete these additional steps:
30
+
31
+
1. In the Admin Console, go to **Security > API > Authorization Servers**
32
+
2. Select your custom authorization server (`default`)
33
+
3. On the **Access Policies** tab, ensure you have at least one policy:
34
+
- If no policies exist, click **Add New Access Policy**
35
+
- Give it a name like “Default Policy”
36
+
- Set **Assign to** to “All clients”
37
+
- Click **Create Policy**
38
+
4. For your policy, ensure you have at least one rule:
39
+
- Click **Add Rule** if no rules exist
40
+
- Give it a name like “Default Rule”
41
+
- Set **Grant type** is to “Authorization Code”
42
+
- Set **User** is to “Any user assigned the app”
43
+
- Set **Scopes requested** to “Any scopes”
44
+
- Click **Create Rule**
45
+
46
+
For more details, see the [Custom Authorization Server documentation](https://developer.okta.com/docs/concepts/auth-servers/#custom-authorization-server).
21
47
22
48
## Get the Code
23
49
24
-
Grab and configure this project using `okta start react`.
Update your `.okta.env` file with the values from your application's configuration:
56
+
57
+
```text
58
+
ISSUER=https://dev-133337.okta.com
59
+
CLIENT_ID=0oab8eb55Kb9jdMIr5d6
60
+
```
61
+
62
+
### Where are my new app's credentials?
63
+
64
+
Creating an OIDC Single-Page App manually in the Admin Console configures your Okta Org with the application settings. You may also need to configure trusted origins for `http://localhost:3000` in **Security > API > Trusted Origins**.
65
+
66
+
After creating the app, you can find the configuration details on the app’s **General** tab:
67
+
-**Client ID**: Found in the **Client Credentials** section
68
+
-**Issuer**: Found in the **Issuer URI** field for the authorization server that appears by selecting **Security > API** from the navigation pane.
0 commit comments