Skip to content

Commit 160c74b

Browse files
Acrolinx improvements and work on the testing sections
1 parent 787931a commit 160c74b

File tree

10 files changed

+27
-26
lines changed

10 files changed

+27
-26
lines changed

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/clear/afterappidpinokta.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Ensure that you’ve created a group for users who you want to verify with CLEAR
1414
* Use the Okta account management policy `id` as the `policyId` value.
1515
* Set the group ID. Use the [List all groups call](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroups) to find the `id` for the test group.
1616
* Set the `verificationMethod` type to `ID_PROOFING`.
17-
* Set the `verificationMethod` > `id` as the ID of the <StackSnippet snippet="idp" inline /> IdP that you created in the [previous section](#create-the-idv-vendor-in-okta).
17+
* Set the `verificationMethod.id` as the ID of the <StackSnippet snippet="idp" inline /> IdP that you created in the [previous section](#create-the-idv-vendor-in-okta).
1818
* Set `appSignOn` access value to `ALLOW`.
1919
* Use the following [Okta Expression Language](/docs/reference/okta-expression-language-in-identity-engine/) object:
2020

@@ -150,6 +150,6 @@ You now have a <StackSnippet snippet="idp" inline /> project in a Sandbox enviro
150150

151151
You can use the link to test the IDV flow or you can share it with others. In the Sandbox environment, no actual verifications are performed. You can use test credentials to complete the verification. The test verification doesn't interact with Okta so you can only test the IDV flow.
152152

153-
To test the integration with Okta, you must use a real user account with verifiable user information in your org and use a Production environment project. For example, if your IDV flow requires a government-issued ID, your user account must have an ID that matches that requirement.
153+
To test the integration with Okta, you must use a real user account with verifiable user information and use a Production environment project. For example, if your IDV flow requires a government-issued ID, your user account must have an ID that matches that requirement.
154154

155155
When you're ready to go live with your CLEAR project, you can publish your project to the Production environment. See [Going Live with CLEAR](http://docs.clearme.com/docs/going-live-with-clear).

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/clear/appidpinokta.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Use the [IdP API](https://developer.okta.com/docs/api/openapi/okta-management/ma
55
1. Set the following request body parameters:
66

77
* Enter a value for `name`.
8-
* Set `type` to `IDV_INCODE`.
8+
* Set `type` to `IDV_CLEAR`.
99
* Set `ID_PROOFING` as the protocol type.
1010
* Use the **Client ID** and **Client Secret** values from the [previous section](#create-an-app-at-the-idv-vendor) as the `client_id` and `client_secret` values.
1111
* Set the `scopes` array to include the `profile`, `identity_assurance`, and `openid` scopes.

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/clear/learningoutcome.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ Configure an IDV vendor so that your user’s identities are verified when they
1919
* An account with <StackSnippet snippet="idpaccount" inline />
2020
* A new [group](https://help.okta.com/okta_help.htm?type=oie&id=usgp-groups-create) in your org for IDV users
2121

22-
---
22+
---

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/customidv/afterappidpinokta.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,4 +144,4 @@ After you've configured your custom IDV vendor and created the Okta account mana
144144

145145
Testing the integration can depend on your IDV vendor. Depending on your vendor, you might be able to use a sandbox environment to complete the verification. See your IDV vendor's documentation for more information about testing the integration.
146146

147-
However, there's a simple way to test if the Okta account management policy and IDV vendor are set up correctly in your org. Try to enroll an authenticator using your test user. If everything is set up correctly, that user is prompted to verify their identity with the IDV vendor before they can complete the enrollment.
147+
However, there's a simple way to test if the Okta account management policy and IDV vendor are set up correctly in your org. Try to enroll an authenticator using your test user. If your IDV vendor and policy are set up correctly, that user is prompted to verify their identity with the IDV vendor before they can complete the enrollment.

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/customidv/appatidp.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ When you create a custom IDV vendor integration in your org, the vendor must fir
66
| End user license agreement (EULA) | The vendor must provide a URL that links to the EULA that your users must accept before using the IDV vendor. |
77
| Privacy policy | The vendor must provide a URL that links to the privacy policy that explains the vendor's privacy practices. |
88
| Client ID | The vendor must provide a client identifier for the app that you create at the vendor. |
9-
| Client Secret | The vendor must provide a client secret for the app that you create at the vendor. |
10-
| Issuer URL | The vendor must provide a URL that identifies the IDV vendor. This is the base URL for the IDV vendor’s authorization server. <br></br>This URL identifies the IDV vendor and is used as the issuer in OAuth and OpenID Connect requests. Okta uses it to verify tokens and establish trust during the IDV flow. |
11-
| PAR Request URL | The vendor must provide a URL that Okta uses to send Pushed Authorization Requests (PAR) to the IDV vendor. <br></br>Okta sends a POST request to this URL to initiate a verification session and transmit user claims and verification parameters. |
9+
| Client secret | The vendor must provide a client secret for the app that you create at the vendor. |
10+
| Issuer URL | The vendor must provide a URL that identifies the IDV vendor. This is the base URL for the IDV vendor’s authorization server. <br></br>This URL identifies the IDV vendor and is used as the issuer in OAuth 2.0 and OpenID Connect (OIDC) requests. Okta uses it to verify tokens and establish trust during the IDV flow. |
11+
| PAR request URL | The vendor must provide a URL that Okta uses to send Pushed Authorization Requests (PAR) to the IDV vendor. <br></br>Okta sends a POST request to this URL to initiate a verification session and transmit user claims and verification parameters. |
1212
| Authorize URL | The vendor must provide a URL that Okta uses to redirect users to the IDV vendor for identity verification. |
1313
| Token URL | The vendor must provide a URL that Okta uses to exchange the authorization code for an access token and an ID token. |
1414
| JWKS URL | The vendor must provide a URL that Okta uses to retrieve JSON Web Keys (JWKS) from the IDV vendor. |
@@ -17,4 +17,4 @@ For more information about these requirements, see [Integrate Okta with identity
1717

1818
After your IDV vendor provides this information, you can create the IdP integration in your org.
1919

20-
> **Note:** Your IDV vendor might have additional configuration settings. Refer to your IDV vendor's documentation for more information about other configuration settings.
20+
> **Note:** Your IDV vendor might have other configuration settings. Refer to your IDV vendor's documentation for more information about other configuration settings.

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/customidv/learningoutcome.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Configure a custom IDV vendor so that your user’s identities are verified when
1616
#### What you need
1717

1818
* [Okta Integrator Free Plan org](https://developer.okta.com/signup)
19-
* An IDV vendor that's integrated with Okta
19+
* [An IDV vendor that's integrated with Okta](/docs/guides/idv-integration/)
2020
* An account with the custom IDV vendor
2121
* A test [user account](https://help.okta.com/okta_help.htm?type=oie&id=ext-usgp-add-users) that you can use to enroll an authenticator
2222
* A test [group](https://help.okta.com/okta_help.htm?type=oie&id=usgp-groups-create) in your org that the test user is added to

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/incode/afterappidpinokta.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Ensure that you’ve created a user account and group for that user. For example
1414
* Use the Okta account management policy `id` as the `policyId` value.
1515
* Set the group ID. Use the [List all groups call](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroups) to find the `id` for the test group.
1616
* Set the `verificationMethod` type to `ID_PROOFING`.
17-
* Set the `verificationMethod` > `id` as the ID of the <StackSnippet snippet="idp" inline /> IdP that you created in the [previous section](#create-the-idv-vendor-in-okta).
17+
* Set the `verificationMethod.id` as the ID of the <StackSnippet snippet="idp" inline /> IdP that you created in the [previous section](#create-the-idv-vendor-in-okta).
1818
* Set `appSignOn` access value to `ALLOW`.
1919
* Use the following [Okta Expression Language](/docs/reference/okta-expression-language-in-identity-engine/) object:
2020

@@ -140,16 +140,16 @@ Ensure that you’ve created a user account and group for that user. For example
140140

141141
## Test the integration
142142

143-
You now have a <StackSnippet snippet="idp" inline /> project in a Sandbox environment. You can configure different IDV settings in the Sandbox environment and perform test verifications to see how your IDV flow works.
143+
After you've configured <StackSnippet snippet="idp" inline /> as an IDV vendor and created the Okta account management policy rule, you can test the integration.
144+
145+
You can test the integration directly from your <StackSnippet snippet="idp" inline /> app. However, you must use a real user account with verifiable user information. For example, if your IDV flow requires a government-issued ID, your user account must have an ID that matches that requirement.
144146

145147
1. Go to your <StackSnippet snippet="idp" inline /> dashboard.
146-
1. Go to **Projects** and select your project.
147-
1. Click **Preview**.
148-
1. Click **Generate** to create a link to a test verification session.
148+
1. Go to **Helpdesk Verification**.
149+
1. Under **Employee**, select the user you want to test the IDV flow with.
150+
1. Under **Verification method**, select **Via sharing a Link**.
151+
1. Click **Generate Verification & Copy Link**. The link is copied to your clipboard.
149152
1. Open the generated link in a new browser tab.
153+
1. Complete the IDV flow.
150154

151-
You can use the link to test the IDV flow or you can share it with others. In the Sandbox environment, no actual verifications are performed. You can use test credentials to complete the verification. The test verification doesn't interact with Okta so you can only test the IDV flow.
152-
153-
To test the integration with Okta, you must use a real user account with verifiable user information in your org and use a Production environment project. For example, if your IDV flow requires a government-issued ID, your user account must have an ID that matches that requirement.
154-
155-
When you're ready to go live with your CLEAR project, you can publish your project to the Production environment. See [Going Live with CLEAR](http://docs.clearme.com/docs/going-live-with-clear).
155+
To verify that the the Okta account management policy and <StackSnippet snippet="idp" inline /> are set up correctly in your org, try to enroll an authenticator with your user. If your IDV vendor and policy are set up correctly, that user is prompted to verify their identity with the IDV vendor before they can complete the enrollment.
Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
1-
At [<StackSnippet snippet="idp" inline />](https://workforce.incode.com/overview), follow these steps to create an Okta IDV integration: [Create Okta IDV Integration in Incode Workforce](https://workforce.developer.incode.com/docs/incode-okta-idv-configuration#step-1-create-okta-idv-integration-in-incode-workforce).
1+
There are two steps to configure <StackSnippet snippet="idp" inline /> as an IDV vendor in Okta:
22

3-
Ensure that you copy the **Client ID** and **Client Secret** values into a text editor. You need these values in the next section.
3+
1. At [<StackSnippet snippet="idp" inline />](https://workforce.incode.com/overview), follow these steps to create an Okta IDV integration: [Create Okta IDV Integration in Incode Workforce](https://workforce.developer.incode.com/docs/incode-okta-idv-configuration#step-1-create-okta-idv-integration-in-incode-workforce). Ensure that you copy the **Client ID** and **Client Secret** values into a text editor. You need these values in the next section.
4+
2. Then, integrate your user directory in Okta with <StackSnippet snippet="idp" inline />. Follow these steps to integrate your user directory in your <StackSnippet snippet="idp" inline /> app: [Incode Directory Sync Integration with Okta IAM](https://workforce.developer.incode.com/docs/okta-service-app-api-integration). Use your test group ID when syncing your test group in your <StackSnippet snippet="idp" inline /> app.
45

56
### Other IDV vendor configuration
67

78
There are more settings for the <StackSnippet snippet="idp" inline /> app that you can configure. The steps in this guide address the quickest route to set up <StackSnippet snippet="idp" inline /> as an IDV vendor with Okta.
89

9-
See the [<StackSnippet snippet="idp" inline /> documentation](https://workforce.developer.incode.com/docs/incode-okta-idv-configuration) for more information about other configuration settings.
10+
See the [<StackSnippet snippet="idp" inline /> documentation](https://workforce.developer.incode.com/docs/setup-wizard-guide#step-2-configure-verification-policy) for more information about other configuration settings.

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/incode/learningoutcome.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Configure an IDV vendor so that your user’s identities are verified when they
1717

1818
* [Okta Integrator Free Plan org](https://developer.okta.com/signup)
1919
* An account with <StackSnippet snippet="idpaccount" inline />
20-
* A test [user account](https://help.okta.com/okta_help.htm?type=oie&id=ext-usgp-add-users) that you can use to enroll an authenticator
21-
* A test [group](https://help.okta.com/okta_help.htm?type=oie&id=usgp-groups-create) in your org that the test user is added to
20+
* A real [user account](https://help.okta.com/okta_help.htm?type=oie&id=ext-usgp-add-users) with verifiable user information
21+
* A test [group](https://help.okta.com/okta_help.htm?type=oie&id=usgp-groups-create) in your org that the user is added to
2222

2323
---

packages/@okta/vuepress-site/docs/guides/add-id-verification-idp/main/persona/afterappidpinokta.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Ensure that you’ve created a user account and group for that user. For example
1414
* Use the Okta account management policy `id` as the `policyId` value.
1515
* Set the group ID. Use the [List all groups call](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroups) to find the `id` for the test group.
1616
* Set the `verificationMethod` type to `ID_PROOFING`.
17-
* Set the `verificationMethod` > `id` to the Okta Persona IdP that you created in the [previous section](#create-the-idv-vendor-in-okta).
17+
* Set the `verificationMethod.id` to the Okta Persona IdP that you created in the [previous section](#create-the-idv-vendor-in-okta).
1818
* Set `appSignOn` access value to `ALLOW`.
1919
* Use the following [Okta Expression Language](/docs/reference/okta-expression-language-in-identity-engine/) object:
2020

0 commit comments

Comments
 (0)