This guide will walk you through the process of setting up Okta OAuth 2.0 authentication for Eva integration.
https://eva.foxio.io
)Log in to your Okta Admin Dashboard:
https://dev-XXXXXX-admin.okta.com
https://yourcompany-admin.okta.com
Note your Okta domain:
https://dev-123456.okta.com
or https://yourcompany.okta.com
Navigate to Applications:
Select Sign-in Method:
Configure App Integration Settings:
General Settings:
Grant type:
Sign-in redirect URIs:
https://eva.foxio.io/api/callback
Sign-out redirect URIs: (optional)
Controlled access:
Save the Application
After creating the app, you'll be redirected to the application's page
In the Client Credentials section, you'll find:
Important Security Notes:
Go to the Sign On tab of your application
OpenID Connect ID Token settings:
User consent:
Navigate to the Assignments tab
Assign users or groups:
For testing:
Access Authentication Policies:
Configure session lifetime:
Set up Multi-Factor Authentication (MFA):
Password requirements:
Default Authorization Server:
Verify Scopes:
openid
- OpenID Connect authenticationprofile
- User profile informationemail
- User email addressAccess Policies:
Your Okta OAuth 2.0 endpoints will be:
Authorization endpoint:
https://YOUR_DOMAIN/oauth2/default/v1/authorize
Token endpoint:
https://YOUR_DOMAIN/oauth2/default/v1/token
JWKS endpoint:
https://YOUR_DOMAIN/oauth2/default/v1/keys
Userinfo endpoint:
https://YOUR_DOMAIN/oauth2/default/v1/userinfo
Replace YOUR_DOMAIN
with your Okta domain (e.g., dev-123456.okta.com
).
Test the OAuth Flow:
Verify the authentication flow:
Check token contents:
Production Readiness:
Monitoring:
Compliance:
Common Issues:
"Invalid redirect_uri" error:
"Invalid client" error:
"Access denied" error:
Missing user information:
openid profile email
)Token expiration issues:
Use these values to configure Eva app:
https://dev-123456.okta.com
)For more detailed information, refer to:
After completing this setup guide, you're ready to configure Eva with your Okta credentials.