You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _source/_posts/2025-09-03-cross-app-access.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,7 +141,7 @@ This ensures Bob can sign in to Agent0, and Agent0 can securely request access t
141
141
142
142
> **⚠️ Note:** Bob will be the identity we use throughout this guide to demonstrate how Agent0 accesses Todo0's API through Cross App Access.
143
143
144
-
## Clone and configure the Node.js project
144
+
## Configure the Node.js Cross App Access project
145
145
146
146
With your Okta environment (apps and user) ready, let's set up the local project. Before we dive into configs, here's a quick look at what you'll be working with.
147
147
@@ -164,7 +164,7 @@ With your Okta environment (apps and user) ready, let's set up the local project
164
164
165
165
{% img blog/cross-app-access/image7.jpg alt:"Open project in VS Code Dev Container for local development" width:"800" %}{: .center-image }
166
166
167
-
### What's in the repo (at a glance)
167
+
### The Cross App Access MCP project at a glance
168
168
169
169
```shell
170
170
okta-cross-app-access-mcp/
@@ -184,20 +184,20 @@ okta-cross-app-access-mcp/
184
184
└─ tsconfig.json
185
185
```
186
186
187
-
## Configure environment files for OAuth & AWS Bedrock Integration
187
+
## Configure OAuth 2.0 and AI foundation models environment files
188
188
189
189
At this point, you have:
190
190
191
191
***Client IDs and Client Secrets**for both **Agent0** and **Todo0** (from the Okta Admin Console)
192
-
* Your **Okta org URL**, visible in the top-right profile menu of the Admin Console. It usually looks like
192
+
* Your **Okta org URL**, visible in the Okta Admin Console profile menu of the Admin Console. It usually looks like
193
193
194
194
```
195
195
https://integrator-123456.okta.com
196
196
```
197
197
198
198
This URL will be your **IdP issuer URL** and is shared across both apps.
199
199
200
-
### Generate env files
200
+
### Generate OIDC configuration and access token files
201
201
202
202
From the project root, run:
203
203
@@ -211,7 +211,7 @@ This scaffolds the following files:
211
211
*`packages/authorization-server/.env.agent`
212
212
*`packages/agent0/.env`
213
213
214
-
### Fill required values
214
+
### Configure AI and resource application connection values
215
215
216
216
Open each file and update the placeholder with your org-specific values:
0 commit comments