For the complete documentation index, see llms.txt. Markdown versions of all docs pages are available by appending .md to any docs URL.
Okta
Integrate agentgateway with Okta for enterprise identity management
Okta is an enterprise identity platform. agentgateway can validate JWTs issued by Okta for API authentication.
Why use Okta with agentgateway?
- Enterprise SSO - Centralized identity for organizations
- Directory integration - Active Directory, LDAP sync
- Lifecycle management - Automated provisioning/deprovisioning
- Compliance - SOC 2, HIPAA, FedRAMP certified
- API Access Management - OAuth2/OIDC for APIs
Configuration
Configure agentgateway to validate Okta JWTs:
# yaml-language-server: $schema=https://agentgateway.dev/schema/config
binds:
- port: 3000
listeners:
- routes:
- backends:
- mcp:
targets:
- name: my-server
stdio:
cmd: npx
args: ["@modelcontextprotocol/server-everything"]
policies:
mcpAuthentication:
mode: strict
issuer: https://your-org.okta.com/oauth2/default
audiences:
- api://agentgateway
jwks:
url: https://your-org.okta.com/oauth2/default/v1/keysOkta setup
Create an Authorization Server (or use
default):- Admin Console → Security → API → Authorization Servers
Add a custom scope:
- Name:
agentgateway - Description: Access to agentgateway
- Name:
Create an API Services application:
- Applications → Create App Integration
- Sign-in method: API Services
- Note the Client ID and Client Secret
Grant the scope to your application
Getting a token
curl -X POST "https://your-org.okta.com/oauth2/default/v1/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=client_credentials" \
-d "client_id=YOUR_CLIENT_ID" \
-d "client_secret=YOUR_CLIENT_SECRET" \
-d "scope=agentgateway"Group-based authorization
Use Okta groups with agentgateway authorization:
policies:
mcpAuthentication:
mode: strict
issuer: https://your-org.okta.com/oauth2/default
audiences: [api://agentgateway]
jwks:
url: https://your-org.okta.com/oauth2/default/v1/keys
authorization:
rules:
# Check for Okta group membership
- '"AI-Users" in jwt.groups'