By integrating Okta with OwnID, you can implement the full set of OwnID features to simplify and streamline your user login experience.

How it Works

OwnID supports integration with Okta through our pre-built Okta Connector.

Configuration on the Okta side happens through your Okta Admin Dashboard. Ensure you have an account with admin access in Okta.

Complete these five basic steps to integrate OwnID with Okta:

Step 1 - Extend Okta User Schema.

Step 2 - Create Okta API Token.

Step 3 - Create the OwnID App.

Step 4 - Create an Identity Provider.

Step 5 - Frontend Integration.

Step 1 - Extend Okta User Schema

Add an attribute in Okta called ownIdData. This is used to store user authentication data in Okta.

  1. In your Okta Admin Dashboard go to Directory -> Profile Editor.

  2. Select the User (default) user group. User view in Okta Profile editor Figure 1. Profile editor

  3. Click +Add Attribute. Add attribute in the User view in Okta Profile editor Figure 2. Add attribute

  4. Complete the attribute configuration as shown below. Attribute configuration in the User view in Okta Profile editor Figure 3. Attribute configuration

  5. Click Save.

Securing User’s Personal Data

OwnID does not store or process any user data. Users’ public keys and device information are stored on your platform.

Private keys are kept exclusively on the user’s device and are never transmitted elsewhere.

Step 2 - Create Okta API Token

  1. In your Okta Admin Dashboard, go to: Security -> API -> Tokens tab.

  2. Click Create Token. Okta Admin Dashboard with Create token button Figure 4. Create API token

  3. Fill in the token name - “OwnID API Token”.

  4. Copy the token value. We will use it in the next step. Pop up indicating token created successfully with actual token embedded Figure 5. Copy API token

  5. Click OK, got it after copying the token.

Step 3 - Create the OwnID App

We’ll create a new OwnID app using the Okta Connector.

Okta Connector tile in OwnID Console

An OwnID App is what connects the existing identity provider used by your website with the OwnID widget you insert on the front end.

OwnID Widget OwnID widget

Each of your OwnID Apps acts as the central point of configuration for each of your integrations. These no-code Apps are created, hosted, and maintained entirely within the OwnID Console environment. When you create an App, it’s assigned a unique appId automatically. Use that appId in OwnID SDK interaction from your website’s front end.

To Create an OwnID App

  1. Login to the OwnID Console (or create your account).

  2. Click +Create Application from the Apps screen.

  3. Enter a name for your application in the App name field.

  4. From the Choose your integration panel, select the tile. Profile editor

  5. Click Next.

  6. Enter the URL to your application instance and click Continue. Profile editor

  7. Click Explore my App on the “Congratulations” popup. Profile editor

  8. From the OwnID Settings panel, copy the App ID and the Shared Secret for use in configuration on the side. Profile editor

Your OwnID application and secret key are created and you’re ready for next steps!

Enter Parameters in Okta

In your Okta integration page, fill in the following information:

  1. In Okta Settings, set the Site Domain - e.g:

  2. In Okta Settings, set the API Token value you created above.

  3. In OpenID Connect settings, set Redirect URIs by adding one or more Okta redirect URIs, typically in the format

  4. Click Save Changes.

The other values in this page will be used in the next step.

Step 4 - Create an Identity Provider

Create an OwnID OIDC Identity Provider.

  1. In your Okta Admin Dashboard, go to Security -> Identity providers.

  2. Click Add identity provider. Add identity provider button in Okta Admin Dashboard Figure 6. Add identity provider

  3. From the provider options, select the OpenID Connect IdP tile. OpenID Connect IdP shown as selected option in grid of identity providers Figure 7. OpenID Connect IdP

  4. The General settings form opens. Configure it with the following general settings: IdP settings form for OpenID Figure 8. IdP settings

  5. For the Client details values use the Client ID and Client Secret from the OwnID application created in the previous step as shown. Client details form for client ID and secret Figure 9. Client details

  6. In Endpoints, enter the values from the OwnID application created in the previous step?

  7. Set the remaining details as shown below: Authentication settings form in Okta Figure 10. Authentication settings

  8. Click Save.

Be sure to copy the IdP ID value from the Summary_ so we can use it in the next step. IdP Summary screen showing IdP ID and the authorize and redirect URLs Figure 11. IdP Summary

Step 5 - Frontend Integration

  1. In your Okta Admin Dashboard, go to Customizations -> Brands.

  2. Select your relevant brand.

  3. Click Customize on the Sign-in page panel. Brand customization in Okta Admin Dashboard Figure 12. Brand customization in Okta

  4. Ensure the Code Editor option is toggled on (requires a custom domain). Code editor toggle on page design tab of Okta Sign-in configuration page Figure 13. Code editor

  5. Under the Head tag, add the following script for loading the OwnID WebSDK:

  6. Replace <appId> with the appId from the OwnID application created in step 3.

  7. Replace <idpId> with the IdP ID from step 4.

Web SDK Configuration
((o, w, n, i, d) => {
    o[i] = o[i] || (async (...a) => ((o[i].q = o[i].q || []).push(a), { error: null, data: null })),
        (e = w.createElement("script")).src = '' + n, e.async = 1, w.head.appendChild(e);
        new OktaSignIn(OktaUtil.getSignInWidgetConfig()).on('afterRender', () => ownid("oktaRender", {idpId: d}))
(window, document, '<appId>', 'ownid', '<idpId>');
  1. Click Save and Publish.
Enjoy your Okta-integrated passwordless authentication!

Next Steps

Ready to deploy?


Take me to the Deployment Checklist