Interactive simulators for OAuth 2.0 and OpenID Connect flows
These are the current supported Protecting AI Agent flows.
Standard OAuth 2.0 and OpenID Connect grant type simulators.
Standard OAuth 2.0 Authorization Code flow with Client ID/Secret for secure authentication in web applications.
OAuth 2.0 Device Authorization Grant for input-constrained devices like smart TVs, CLI tools, and IoT devices. Users authorize on a secondary device.
Transfer authentication from a native app to a web app. Password auth with interclient_access scope, token exchange, and web session creation.
Device SSO flow: authorize with PKCE to get device_secret, then exchange tokens for a second native app without re-authentication.
PendingAuthorize with PKCE, exchange code for tokens, then perform an on-behalf-of token exchange for a downstream API.
PendingClient-Initiated Backchannel Authentication. The client requests authentication via a backchannel, and the user approves on a separate device.
PendingMachine-to-machine authentication using client credentials. The application authenticates with its own identity to access APIs without user involvement.
PendingExchange a SAML 2.0 assertion for an OAuth 2.0 access token. Bridges SAML-based identity providers with OAuth 2.0 resource servers.
PendingDirect authentication grants, device SSO, and backchannel authentication (API Authentication) flows.
Passwordless authentication using a one-time passcode as the primary factor. User provides login hint and OTP to receive tokens directly.
PendingTwo-step authentication: password first, then OTP as a second factor. Demonstrates the MFA challenge-response pattern.
PendingPasswordless authentication using Okta Verify push notification. Initiate OOB authentication and poll for user approval.
PendingPassword authentication followed by Okta Verify push as second factor. Three-step flow with challenge and polling.
PendingPasswordless authentication via SMS or voice call. Initiate OOB authentication, then submit the received verification code.
PendingPassword authentication followed by SMS or voice call as second factor. Three-step flow with challenge and OTP verification.
PendingDirect username and password authentication grant. Simple single-step flow that exchanges credentials for tokens.
Demonstrates the Okta Identity Engine Interaction Code Flow with PKCE, dynamic remediation paths, and ION protocol.
Educational OnlyStandalone APIs that leverage Okta tokens such as userinfo, introspect, revoke, and logout.