This article provides instructions for configuring an Okta Org2Org application using Secure Web Authentication (SWA) for an Okta tenant. By creating an SWA application, one can seamlessly authenticate into another Okta tenant by simply launching an application chiclet/tile. The Okta Browser Plugin automatically populates the Okta credentials (Username and Password).
The steps differ depending on whether the target tenant uses a Password-first or Identifier-first login flow. The Okta Integration Network (OIN) provides a predefined application for the Password-first flow.
- Okta Org2Org
- Secure Web Authentication (SWA)
- Okta Browser Plugin
- Okta Identity Engine (OIE)
- Okta Classic Engine
The Okta Browser Plugin must be installed and authenticated for SWA applications to function correctly.
Password-First Login Flow (Username and Password on the same page)
This flow uses the predefined OIN application.
- Navigate to the Admin Console > Applications > Applications.
- Select Browse App Catalog.
- Search for and select the Okta Org2Org application.
- Select Add integration.
- In the Base URL field, enter the login URL of the target Okta tenant.
- Under Sign on methods, select the Secure Web Authentication option.
Identifier-First Login Flow (Username on first page, Password on second page)
This flow uses a template application.
- Navigate to the Admin Console > Applications > Applications.
- Select Browse App Catalog.
- Search for and select the Template Two Page Plugin App.
- Select Add integration.
- Configure the application with the following settings:
- Application label: Enter a descriptive name, such as "Org2Org Two Page Template Plugin app".
- Login URL:
https://<subdomain>.okta.com - Redirect URL:
https://<subdomain>.okta.com - Password page URL:
https://<subdomain>.okta.com - Username field:
input[autocomplete=username] - Next button:
input[data-type=save] - Password field:
input[type=password] - Submit button:
input[data-type=save]
- If the Okta plugin does not inject the credentials after configuration, modify the Login URL by appending
/login/defaultto the end (for example,https://<subdomain>.okta.com/login/default).
