Loading image...Kiro
  • CLI
  • Powers
  • Autonomous agent
  • Enterprise
  • Pricing
  • Docs
SIGN INDOWNLOADS
Loading image...Kiro
Loading image...Kiro
Product
  • About Kiro
  • CLI
  • Powers
  • Autonomous agent
  • Pricing
  • Downloads
For
  • Enterprise
  • Startups
Resources
  • Documentation
  • Blog
  • Changelog
  • FAQs
  • Report a bug
  • Suggest an idea
  • Billing support
Social
Site TermsLicenseResponsible AI PolicyLegalPrivacy PolicyCookie Preferences
  1. Docs
  2. IDE
  3. Enterprise billing
  4. Connecting your identity provider
  5. Okta

Connect your Okta IdP

On this page
  • Why two applications
  • Step 1: Create OIDC application
  • Create new app integration
  • Add users and groups
  • Step 2: Create SAML application
  • Create app integration
  • Configure provisioning
  • Step 3: Set up custom scopes
  • Create Kiro specific scopes
  • Add access policies
  • Step 4: Set up Kiro Profile
  • Create Kiro Profile
  • Add and verify domain
  • Provision the SAML application

To connect Okta with your Kiro Profile, you need to:

  1. Create an OIDC Okta application
  2. Create a SAML Okta application
  3. Set up custom scopes for OIDC application
  4. Set up Kiro Profile
Important configuration requirement

To connect your Okta with Kiro, you have to verify ownership of your company domain by adding a TXT record in your DNS provider.

Why two applications

When using Okta, you need to create two applications: one for OIDC and one for SAML. This is because in Okta, OIDC application does not support SCIM, but SAML application does. So Kiro will use the SAML application to synchronize users and groups and the OIDC application for users to login.

Step 1: Create OIDC application

Create new app integration

In the Okta Admin Console, navigate to the Applications -> Applications section and select "Create App integration". Select "OIDC - OpenID Connect" for "Sign-in method", and "Native Application" as the Application type.

Loading image...create app integration

Provide a descriptive name, example Kiro-OIDC, for your application and check the "Refresh Token" checkbox in the "Grant type" field. Leave the default values for all other fields.

Next, Set the sign-in redirect URIs: http://localhost:{port-number}/oauth/callback. This is the URI that Kiro clients will listen to when Okta returns the user after they successfully sign-in with Okta. Add a line for each of the following port numbers - 2128, 4649, 6588, 8008, 9091, 49153, 50153, 51153, 52153 and 53153. Your application configuration should look like this:

Loading image...set application name

Ensure that "Skip group assignment for now" is selected and select "Save" to complete creating the application. This will show the details of the newly created application.

Loading image...OIDC application details

Add users and groups

Next, you will add the users and groups that will be part of the application. Select the "Assignments" tab. Select the "Assign" button and follow the instructions to add users and groups that should have access to Kiro.

Loading image...OIDC application assignments

You have completed creating the OIDC application.

Step 2: Create SAML application

Create app integration

Next, you have to create the SAML application and configure users and groups. In the Okta Admin Console, navigate to the Applications -> Applications section and select "Create App integration". Select "SAML 2.0" for "Sign-in method" and select "Next".

Loading image...Create SAML application

Set a descriptive name for the application in the "General Settings" section, for example Kiro-SAML, and select "Next".

Loading image...SAML application settings

In the "SAML Settings" page, "Single sign-on URL" and "Audience URI" are required fields. Since Kiro uses the OIDC application for user login, these attributes are not used, but required for configuration. The Single sign-in URL needs to be a URL format, for example https://okta.com, and the "Audience URI" can be anything, for example kiro. Select "Next".

Next, in the "Help Okta Support section", choose the appropriate value for how you want Okta support to assist and select "Finish" to complete the setup.

Configure provisioning

Lastly, you have to configure the provisioning format. Select the "General" tab, navigate to the "App Settings" section and select "Edit". Set the "SCIM" as the "Provisioning" type and select "Save" to complete setting up the SAML application.

Loading image...Okta application use SCIM

Step 3: Set up custom scopes

Create Kiro specific scopes

Now that both applications have been created, you have to set up the scopes to allow user identities to present the right authorization to access Kiro. You will set up two scopes - completions and conversations.

In the Okta Admin console, navigate to the Security -> API section. In the "Authorization Servers" tab, select "Add Authorization Server" button.

Loading image...Okta API Security

Enter a name and description for the Authorization Server.

Loading image...Okta add authorization server

Select "Save" to complete adding the server.

Loading image...Okta add authorization server

Select the "Scopes" tab and select the "Add Scope" button to add a scope that authorizes user identities to access a Kiro feature.

First, add a scope for codewhisperer:completions with "User content" value set to "Implicit". Select "Create" to add the scope.

Loading image...Okta add completions scope

Follow the same steps to add a scope for codewhisperer:conversations.

Add access policies

Next, you have to add access policies and rules to the Authorization Server to control what Kiro can access through the Kiro OIDC application.

Select the "Access Policies" tab and select the "Add Policy" button.

Loading image...Okta access policies

Set a descriptive name for the policy and assign the policy to the Kiro OIDC application you created - Kiro-OIDC.

Loading image...Okta add policy

After the policy is created, you will see the policy name listed in the policies list. Select the policy name to view the details, and select "Add rule" add a new rule

Loading image...Okta policy rules

Leave the default values for all the fields except for "Scopes requested". Select "The following scopes:" option and add the "codewhisperer:completions", "codewhisperer:conversations" and "offline_access" scopes. Select "Create rule" to complete adding the rule.

Loading image...Okta policy add rule

Lastly, test the configuration. To test, select the "Token Preview" tab. Select the OIDC application you created for Kiro (ex: Kiro-OIDC) in the "OAuth/OIDC client" field, select "Authorization Code" as the "Grant type", and select the two codewhisperer scopes, and "offline_access" in the "Scopes" field. Select the "Preview Token" button and if the configuration is valid, the Payload section in the "Preview" panel will contain a "iss" attribute with value, and the "scp" attribute will contain the three scopes you selected.

Loading image...Okta token preview

You have completed all the steps required to configure the applications in Okta. Now you can create the Kiro Profile and subscribe your users and groups.

Step 4: Set up Kiro Profile

Create Kiro Profile

In the AWS Kiro Console, select "Sign up for Kiro" and select "Set up application as Admin". Select the "Connect an existing external Identity provider" option.

Loading image...Kiro Profile configuration

From the Okta Admin Console, navigate to Security -> API section and select the Authorization Server that you created for Kiro.

Loading image...Okta authorization server URI

Copy the Metadata URI value and paste it in the Issuer URL field of the Kiro Profile. Add this text - "/.well-known/openid-configuration" to the end of the value in the "Issuer URL" field.

In the Okta Admin Console, navigate to the Applications section, and open the OIDC application that you created for Kiro integration, for example Kiro-OIDC. Copy the Client ID value and paste it in the Application Id field of the Kiro Profile.

Loading image...Okta OIDC application details

Select "Enable" to complete creating the Kiro Profile.

Add and verify domain

In the Kiro console, select the "Settings" button and in the Identity management -> Domains section, select "Add domain" to add your company domain

Loading image...Add company domain

Selecting "Add" will add the domain and show you a verification token. Copy the verification token. The domain added will show up in the Domains list with "Pending" status.

In your DNS Provider like Amazon Route53, create TXT record with that verification token.

Loading image...Add DNS record

If the configuration is valid, after a few minutes the status will be "Verified".

Loading image...Domain verified

Provision the SAML application

In this step, you will provision the Kiro application and verify that Kiro can sync identities from your Okta identity store.

In the Okta Admin console, navigate to Applications section and select the SAML application ("Kiro-SAML") you created for Kiro. Select the "Provisioning" tab

Select "Edit" in the "SCIM Connection" section.

Loading image...Editing SCIM connection

Set the "Authentication Mode" to HTTP Header.

In the Kiro AWS console, navigate to Settings -> Identity Management -> Access Tokens section. Select "Generate Token" to generate an access token. Copy the access token and paste it in the "Authorization" field in the HTTP Header section.

Next, from the Settings page of the Kiro profile in the AWS console, copy the value in "SCIM Endpoint" from the "Identity management" section. Paste that in the "SCIM connector based URL" field in the SCIM Connection section in Okta.

Set the "Unique identifier field for users" with the value userName. This indicates that user name field is the unique identifier for users. Select all the three Push options under "Supported provisioning actions" sections.

Now, you can test the SCIM connection. You should see that the connector was configured successfully.

Loading image...Testing SCIM connection

Select "Save". And this will show two new options in the side bar - "To App" and "To Okta". With this, you have set up the secure synchronization of identities to Kiro from Okta.

Select the "To App" option to provision from Okta to Kiro. Enable "Create Users" and "Update User Attributes" and select "Save".

Next, navigate to the "Assignments" tab and assign the same users and groups that you add in the Kiro OIDC application (ex: Kiro-OIDC).

Loading image...Okta assign users

You have now completed all the steps required to configure an application in Okta, connect the application with a Kiro Profile, and add users/groups to the Profile. You can now start subscribing team members to Kiro.

Page updated: February 12, 2026
IAM Identity Center
Microsoft Entra