<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
X-Forwarded-For Header Usage and Implementation
Okta Classic Engine
Okta Identity Engine
Administration
Overview

This article explains the X-Forwarded-For (XFF) header and how it relates to Okta.

Applies To
  • X-Forwarded-For Header
Solution

The public IP address of the app is automatically used as the client IP address for the request. Okta supports the standard X-Forwarded-For HTTP header to forward the originating client's IP address if the app is behind a proxy server or acting as a sign-in portal or gateway.

NOTE: The public IP address of the trusted web app must be a part of the allowlist in the org's network security settings as a trusted proxy to forward the user agent's original IP address with the X-Forwarded-For HTTP header.

 

Related References

Loading
X-Forwarded-For Header Usage and Implementation