Hello there! Has anyone run into an issue where a service app setup to use jwt is unable to be granted okta.apps.read scope?
Here are the basic steps I’m following.
- Grant the “okta.apps.manage” scope to the service app
- Configure the public key in the service app
- Sign the payload. ie with the private key
{
“aud”: “https://{okta-domain}/oauth2/v1/token”,
“iss”: “{client_id}”,
“sub”: “{client_id}”,
“exp”: “1715031183060”
} - Retrieve the token from https://{okta-domain}/oauth2/v1/token by configuring these headers:
client_assertion_type = urn:ietf:params:oauth:client-assertion-type:jwt-bearer
client_assertion = signed payload
scope = okta.apps.manage - Successfully retrieves bearer token from step 3
- Make a request to https://{okta-domain}/api/v1/apps
- Okta returns with an error message like this:
{
“errorCode”: “E0000006”,
“errorSummary”: “You do not have permission to perform the requested action”,
“errorLink”: “E0000006”,
“errorCauses”:
}
Interestingly, if I try the same with okta.users.manage, it will return an empty list of users instead of a 403 error.
Any thoughts? TIA