Hello!
Our Okta is integrated with these external IdPs using SAML:
- Azure AD (Microsoft Entra ID)
- Okta (Org2Org)
- ADFS
Configuration:
- Using Okta Hosted Sign-On Widget
- Our Okta is integrated with custom OIDC App that the external IdP users access
- IdP routing rules are set up to redirect users to authenticate with their external IdP based on their username format
How can users bypass Okta login page during IdP-initiated login flow to SSO to the OIDC app:
1- User Authenticated with their External IdPs.
2- User navigates directly to the OIDC application URL
3- User gets redirected to Okta to enter their username in Okta Login Page
4 - User enter their username (External IdP username) in Okta Login page
5 - User get logged in to the OIDC app.
Is there a way to bypass 3 & 4? (We’re aware that we can use the routing rules for IPs)
Please let us know if there are any methods to achieve this.
Edit: Has anyone done this via setting the idp={IdP ID} parameter in a login link that users may directly access?
Example: “https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa18hsHsG3boVejU0g4&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri=${redirectUri}&state={state}&nonce={nonce}”