Skip to content

Commit afb34ab

Browse files
cavazosjoejcavazos
andauthored
Update README.md to reference Integrator accounts during setup. (#516)
* Update README.md to reference Integrator accounts during setup. * Include steps to setup authorization server. --------- Co-authored-by: jcavazos <jcavazos@itpops.com>
1 parent 04e9ba6 commit afb34ab

File tree

1 file changed

+50
-7
lines changed

1 file changed

+50
-7
lines changed

README.md

Lines changed: 50 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,19 @@ This example shows how to use the [Okta React Library][] and [React Router](http
44

55
## Prerequisites
66

7-
Before running this sample, you will need the following:
8-
9-
* [The Okta CLI Tool](https://github.com/okta/okta-cli#installation)
10-
* An Okta Developer Account (create one using `okta register`, or configure an existing one with `okta login`)
7+
Before you begin, you’ll need an Okta Integrator Free Plan account. To get one, sign up for an [Integrator account](https://developer.okta.com/login). Once you have an account, sign in to your [Integrator account](https://developer.okta.com/login). Next, in the Admin Console:
8+
9+
1. Go to **Applications > Applications**
10+
2. Click **Create App Integration**
11+
3. Select **OIDC - OpenID Connect** as the sign-in method
12+
4. Select **Single-Page Application** as the application type, then click **Next**
13+
5. Enter an app integration name
14+
6. In the **Grant type** section, ensure both **Authorization Code** and **Refresh Token** are selected
15+
7. Configure the redirect URIs:
16+
- **Sign-in redirect URIs:** `http://localhost:3000/callback`
17+
- **Sign-out redirect URIs:** `http://localhost:3000`
18+
8. In the **Controlled access** section, select the appropriate access level
19+
9. Click **Save**
1120

1221
## Configure Okta resources
1322

@@ -17,13 +26,47 @@ Sign into your [Okta Developer Edition account](https://developer.okta.com/login
1726

1827
**Verify Authorization Server**
1928

20-
This repo calls a custom resource server to demonstrate making a protected resource request using an access token. Ensure that your default custom authorization server has an access policy. Add an access policy if it's not there. See [Create access polices](https://help.okta.com/okta_help.htm?type=oie&id=ext-create-access-policies).
29+
When using a custom authorization server, you need to set up authorization policies. Complete these additional steps:
30+
31+
1. In the Admin Console, go to **Security > API > Authorization Servers**
32+
2. Select your custom authorization server (`default`)
33+
3. On the **Access Policies** tab, ensure you have at least one policy:
34+
- If no policies exist, click **Add New Access Policy**
35+
- Give it a name like “Default Policy”
36+
- Set **Assign to** to “All clients”
37+
- Click **Create Policy**
38+
4. For your policy, ensure you have at least one rule:
39+
- Click **Add Rule** if no rules exist
40+
- Give it a name like “Default Rule”
41+
- Set **Grant type** is to “Authorization Code”
42+
- Set **User** is to “Any user assigned the app”
43+
- Set **Scopes requested** to “Any scopes”
44+
- Click **Create Rule**
45+
46+
For more details, see the [Custom Authorization Server documentation](https://developer.okta.com/docs/concepts/auth-servers/#custom-authorization-server).
2147

2248
## Get the Code
2349

24-
Grab and configure this project using `okta start react`.
50+
```bash
51+
git clone https://github.com/okta-samples/okta-react-sample.git
52+
cd okta-react-sample
53+
```
54+
55+
Update your `.okta.env` file with the values from your application's configuration:
56+
57+
```text
58+
ISSUER=https://dev-133337.okta.com
59+
CLIENT_ID=0oab8eb55Kb9jdMIr5d6
60+
```
61+
62+
### Where are my new app's credentials?
63+
64+
Creating an OIDC Single-Page App manually in the Admin Console configures your Okta Org with the application settings. You may also need to configure trusted origins for `http://localhost:3000` in **Security > API > Trusted Origins**.
65+
66+
After creating the app, you can find the configuration details on the app’s **General** tab:
67+
- **Client ID**: Found in the **Client Credentials** section
68+
- **Issuer**: Found in the **Issuer URI** field for the authorization server that appears by selecting **Security > API** from the navigation pane.
2569

26-
Follow the instructions printed to the console.
2770

2871
## Run the Example
2972

0 commit comments

Comments
 (0)