<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Client Credentials Grant Type Missing for OIDC Web App
API Access Management
Okta Classic Engine
Okta Identity Engine
Overview

This article offers guidance on why an OIDC Web App would be missing Client Credentials as a grant type.

The option

Applies To
  • OIDC
  • API Access Management
  • Web apps
Cause

It is impossible to enable the Client Credentials grant-type if it lacks the API Access Management feature add-on.

Solution

This limitation occurs because the Client Credentials flow never has a user context, so requesting OpenID scopes is impossible. Instead, create a custom scope, which requires working with a custom authorization server, which in turn requires the API Access Management feature.

As API Access Management is a paid add-on feature, contact the designated Okta Account Manager to learn more about pricing directly. If no Account Manager is assigned or the account owner's contact information is unknown, please contact our Sales Team. Details are on our Contact us page.

NOTE: If the built-in Org Authorization Server is used, know that the Client Credentials flow can only be used with the Org Authorization Server to obtain Access Tokens that the Okta management endpoints can ingest.


Related References

Loading
Client Credentials Grant Type Missing for OIDC Web App