@muneer To integrate Azure AD with Okta as an identity provider using OpenID Connect, you can follow the steps below:
- In the Okta administration portal, select Security > Identity Providers to add a new identity provider. Select Add OpenID Connect.
- On the Identity Provider page, enter a name for the identity provider and the OpenID Connect metadata URL for Azure AD The metadata URL is
https://login.microsoftonline.com/{tenant-id}/.well-known/openid-configuration
, where{tenant-id}
is the ID of your Azure AD tenant. - Select Show Advanced Settings. By default, this configuration ties the user principal name (UPN) in Okta to the UPN in Azure AD for reverse-federation access. If your UPNs in Okta and Azure AD don't match, select an attribute that's common between users.
- Finish your selections for autoprovisioning. By default, if no match is found for an Okta user, the system attempts to provision the user in Azure AD. If you've migrated provisioning away from Okta, select Redirect to Okta sign-in page.
- On the Identity Providers menu, select Routing Rules > Add Routing Rule. Use one of the available attributes in the Okta profile.
By following these steps, you can integrate Azure AD with Okta as an identity provider using OpenID Connect. Let me know if you have any further questions. Let me know if you have any further questions. Please "Accept the answer" if the information helped you. This will help us and others in the community as well.