Hello @Ramya Kamalanath , thank you for sharing the details. Ideally, the redirect URI for any app has to be provided by the application team as it's the URI where the app expects to receive the token from AAD or any other IDP. Hence it is something that the application team should have an understanding of.
Now coming to the bigger question of Adding Okta as IDP on Azure AD for that we can go by the general understanding of adding Okta as the External Identity provider on AAD and create a claims provider trust with it and on Okta's end AAD would be as a replying party.
To do that I guess you can try to check on the steps mentioned in this article where you would add O365 as an RP to Okta: https://help.okta.com/en/prod/Content/Topics/Apps/Office365-Deployment/deploy-main.htm
Disclaimer: This response contains a reference to a third-party World Wide Web site. Microsoft is providing this information as a convenience to you. Microsoft does not control these sites and has not tested any software or information found on these sites; therefore, Microsoft cannot make any representations regarding the quality, safety, or suitability of any software or information found there. There are inherent dangers in the use of any software found on the Internet, and Microsoft cautions you to make sure that you completely understand the risk before retrieving any software from the Internet.
Hope this helps.
Do let us know if this helps and if there are any more queries around this, please do let us know so that we can help you further. Also, please do not forget to accept the response as an Answer; if the above response helped in answering your query