Home

Documentation

Documentation

Requesting App Overview

Your app is the requesting party in the Cross App Access flow. It authenticates users through an Identity Provider, obtains a delegation credential (the ID-JAG), exchanges that credential for an access token, and calls a protected resource — either a REST API or an MCP server. The entire flow happens without an interactive consent prompt because the IDP asserts the user's identity on your app's behalf.


Where your app fits

Your app drives every step. The IDP, Auth Server, and Resource Server respond to your requests — you never need to modify or deploy those services.


What you'll set up

  1. Register Your App — Create an OAuth client at the IDP and get credentials (client_id / client_secret).
  2. Step 1: OIDC Login — Authenticate the user via Authorization Code + PKCE to obtain a signed ID Token.
  3. Step 2: Token Exchange — Exchange the ID Token for an ID-JAG (RFC 8693) through the IDP's token endpoint.
  4. Step 3: JWT Bearer Grant — Present the ID-JAG to the Authorization Server (RFC 7523) to receive a scoped access token.
  5. Step 4: Call the Resource — Use the access token to call a REST API (Authorization: Bearer) or invoke MCP server tools.

What the playground provides

The XAA Playground ships with three pre-configured services so you can focus on building your requesting app:

ServiceURLWhat it does
Identity Provider (IdenX)https://idp.xaa.devAuthenticates users and issues ID Tokens / ID-JAGs
Authorization Serverhttps://auth.resource.xaa.devValidates ID-JAGs and issues access tokens
Resource Serverhttps://api.resource.xaa.devA Todo API (REST + MCP) that accepts access tokens

You don't need to run or configure these services — they're already running. Just register your app and start coding.


Next step

Ready to get started? Register Your App to create your OAuth client and connect it to a resource.

These materials and any recommendations within are not legal, privacy, security, compliance, or business advice. These materials are intended for general informational purposes only and may not reflect the most current security, privacy, and legal developments nor all relevant issues. You are responsible for obtaining legal, security, privacy, compliance, or business advice from your own lawyer or other professional advisor and should not rely on the recommendations herein.

Presented byOkta Developer

Copyright © 2026 Okta. All rights reserved.