Hi @naseem
The issue occurs because the OIDC application sends response_mode=form_post when redirecting to the /authorize endpoint. To resolve this use case, you can create a new bookmark application in Okta by going to Admin >> Applications >> Add Application and search for “Bookmark App”. This will create a chiclet that, when clicked, will redirect to a static link.
This static link would need to be the link to /authorize endpoint, passing client_id and response_mode=fragment, in order to send the JWT tokens as fragment parameters in the url, same as implicit flow does.
The bookmark application would need to be assigned to the same users that have access to the initial OIDC app and then hide the OIDC app from being displayed on the end user dashboard.