Set Up Okta User Provisioning with OAuth 2.0

Configure the OIDC client for Okta User Provisioning.

Prerequisites

  1. Ensure you are currently using Okta user provisioning via API.

  2. Ensure that the Okta App is on the newest version and that it does not have space for the API key.

  3. The person authenticating the integration in Okta must have admin credentials in Coupa. If not, the system will throw a 404 error when it tries to apply the redirect.

Configure the Coupa Platform

  1. Navigate to Setup > integrations > OAuth2/OpenID Connect Clients.

  2. Click Create.

  3. Input the following values and click Save.

Field

Value

Grant Type

Authorization Code

Name

Any

Redirect URL

https://system-admin.okta.com/admin/app/generic/oauth20redirect

Shared Secret

Enabled

Enable Scopes

core.user.read, core.user.write, offline_access, openid

Configure the Okta Application

  1. Within your Okta Coupa application, select Enable API integration.

  2. Input the following values and click Save.

Field

Value

API endpoint

https://{your-instance-name}.coupahost.com/api

OAuth client identifier

Located in the OIDC client created in Coupa

OAuth client secret

Located in the OIDC client created in Coupa

Authentication issues

If you experience a 404 error when attempting to authenticate the API integration, please check for the following issues:

  • The person authenticating the integration in Okta must have admin credentials in Coupa.
  • Make sure that the Your Coupa instance URL field on the general tab in the Coupa application in Okta only contains the name of the instance and not the entire login URL.
    • URL should be: https://{your-instance-name}.coupahost.com
    • URL should not be: https://{your-instance-name}.coupahost.com/session/new
Note:

Please reach out to Coupa support if you require assistance setting up your OIDC client in your instance.