Skip to content

Commit 0459975

Browse files
committed
Apply suggestions from code review
1 parent dc6ce40 commit 0459975

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

_source/_posts/2025-09-03-cross-app-access.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ This ensures Bob can sign in to Agent0, and Agent0 can securely request access t
141141

142142
> **⚠️ Note:** Bob will be the identity we use throughout this guide to demonstrate how Agent0 accesses Todo0's API through Cross App Access.
143143
144-
## Clone and configure the Node.js project
144+
## Configure the Node.js Cross App Access project
145145

146146
With your Okta environment (apps and user) ready, let's set up the local project. Before we dive into configs, here's a quick look at what you'll be working with.
147147

@@ -164,7 +164,7 @@ With your Okta environment (apps and user) ready, let's set up the local project
164164

165165
{% img blog/cross-app-access/image7.jpg alt:"Open project in VS Code Dev Container for local development" width:"800" %}{: .center-image }
166166

167-
### What's in the repo (at a glance)
167+
### The Cross App Access MCP project at a glance
168168

169169
```shell
170170
okta-cross-app-access-mcp/
@@ -184,20 +184,20 @@ okta-cross-app-access-mcp/
184184
└─ tsconfig.json
185185
```
186186

187-
## Configure environment files for OAuth & AWS Bedrock Integration
187+
## Configure OAuth 2.0 and AI foundation models environment files
188188

189189
At this point, you have:
190190

191191
* **Client IDs and Client Secrets** for both **Agent0** and **Todo0** (from the Okta Admin Console)
192-
* Your **Okta org URL**, visible in the top-right profile menu of the Admin Console. It usually looks like
192+
* Your **Okta org URL**, visible in the Okta Admin Console profile menu of the Admin Console. It usually looks like
193193

194194
```
195195
https://integrator-123456.okta.com
196196
```
197197

198198
This URL will be your **IdP issuer URL** and is shared across both apps.
199199

200-
### Generate env files
200+
### Generate OIDC configuration and access token files
201201

202202
From the project root, run:
203203

@@ -211,7 +211,7 @@ This scaffolds the following files:
211211
* `packages/authorization-server/.env.agent`
212212
* `packages/agent0/.env`
213213

214-
### Fill required values
214+
### Configure AI and resource application connection values
215215

216216
Open each file and update the placeholder with your org-specific values:
217217

@@ -245,7 +245,7 @@ AWS_SECRET_ACCESS_KEY=<your AWS secret access key>
245245
> 2. The **Client ID/Client secret** values differ because they come from the respective apps you created
246246
> 3. AWS credentials are required only for Agent0 (requesting app)
247247

248-
### Register redirect URIs for both apps
248+
### Register OAuth 2.0 redirect URIs for both apps
249249

250250
Finally, we need to tell Okta where to send the authentication response for each app.
251251

@@ -310,7 +310,7 @@ At this point, both apps should be live and connected through Okta. 🎉
310310

311311
With everything configured, it's time to see Cross App Access in action.
312312
313-
### Interact with Todo0 by creating tasks
313+
### Interact with Todo0, the XAA resource app, by creating tasks
314314
315315
1. In the **Work Email** field, enter: `[email protected]`, and select **Continue**
316316
{% img blog/cross-app-access/image14.jpg alt:"Sign in to Todo0 app using Bob Tables test user" width:"800" %}{: .center-image }

0 commit comments

Comments
 (0)