<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Use Okta Identity Governance API in Okta Workflows
Identity Governance
Okta Classic Engine
Okta Identity Engine
Overview

The Okta Identity Governance APIs can now be used within Okta Workflows. The governance scopes will need to be granted to be used within the Okta Connection using a Custom API Action. 

If the scopes are not granted, a 403 Forbidden error can occur when trying to reach an OIG API endpoint. The www-authenticate response header included in the error message indicates that the access token does not contain the required scopes, in this example, the okta.governance.accessRequests.read scope:

www-authenticate: Bearer authorization_uri="http://{subdomain}.okta.com/oauth2/v1/authorize""", realm="http://{subdomain}.okta.com", scope="okta.governance.accessRequests.read", error="insufficient_scope", error_description="The access token provided does not contain the required scopes.", resource="/governance/api/v1/requests/{requestId}"

Applies To
  • Okta Identity Governance (OIG)
  • Okta Workflows
  • Access Requests
  • Access Certifications
Solution

To add Governance Scopes to the Okta Connector, please follow the steps below: 

  1. Navigate to the Admin Console as a Super Admin.
  2. Navigate to Applications > Applications and open the Okta Workflows OAuth application.
  3. Under the Scopes tab, look for the scopes needed for the API Endpoints that are going to be reached, and click Grant:
  4. Reauthorize the Okta Connection in Okta Workflows (NOTE: A new connection may be needed).
  5. The Okta Identity Governance APIs can now be utilized through an Okta Custom API Action.

 

 

Loading
Use Okta Identity Governance API in Okta Workflows