REST API Authentication On Atlassian using Okta as OAuth Provider

Atlassian provides REST APIs to perform a number of operations such as Create Page, Delete Page, Add Comment, Create Space, etc. However, it supports only two authentication methods for REST APIs:
  1. Basic Authentication
  2. Using OAuth 1.0
The REST API Authentication plugin allows you to use any third party OAuth 2.0 provider/ OpenID connect to authenticate REST APIs. Here we will go through a guide to configure Okta as Provider.

Download And Installation

  • Log into your atlassian instance as admin.
  • Navigate to the settings menu and Click Manage Apps.
  • Click Find new apps or Find new add-ons from the left-hand side of the page.
  • Locate Api Token/OAuth Authentication app.
  • Click Try free to begin a new trial or Buy now to purchase a license.
  • Enter your information and click Generate license when redirected to MyAtlassian.
  • Click Apply license.

Step 1: Configure Okta server:

  • First of all, go to and log into your Okta account.
  • will be presented with following screen. Click on Applications on the navigation bar on top.
  • Click on Add Application button and select Create New App.
  • Choose Web as platform, OpenID Connect as Sign on method, and click on Create.
  • You will be redirected to the app details page. Enter Application name and Login Redirect URIs. Copy Callback URL from the plugin . Click on Save.
  • You will be brought to App details page. Scroll down to Client Credentials section.
Note: Copy the ClientID and Client Secret.

Step 2: Fetch Access token through POSTMAN

  • Open the Postman Application (Here is the link to download Postman Application).
  • Go to Authorization tab.
  • From the dropdown select type as OAuth 2.0 and  click on Get access token.
  • Add the following information from the table below.
  • Postman starts the authentication flow and prompts you to use the access token.
  • Select Add token to the header.
Field Value
Grant type Authorization Code or Client Credentials
Callback URL Enter the Application's base URL if you dont have a callback URL
Auth URL https://<Domain_Name>/oauth2/default/v1/authorize
Access token URL https://<Domain_Name>/oauth2/default/v1/token
Client ID Enter the Okta Client ID
Client secret Enter the Okta Client secret
Scope openid
Client Authentication Send as Basic Auth Header
  • Copy the Access Token or click on Use Token.
A sample access token from Okta Provider looks like this.

Step 3: Fetch Username through Okta:

  • Choose the method type as "GET".
  • Enter the interoception Endpoint from the plugin to fetch the username in the Request URL. For Okta it is "https://{Domain_Name}/oauth2/default/v1/token".
  • Go to the Authorization tab select the Bearer Token and enter the access token here.
  • Add the header "content-type: application/json" and click on Send.
Confluence-Rest-API-Keycloak-Username Request:
     -X GET 
     -H "Authorization: Bearer <Access Token>" 
     -H "Content-type: application/json" 
Copy the attribute value against the username, you will need to configure it in plugin. In this example, the value is "preferred_username".  

Configure the Rest API plugin:

Step 1: Enable Rest API Authentication:

  • After installing the app, navigate to the app configurations through the Manage Apps dropdown.
  • Here you will have to Enable Authentication through Rest API Authentication.
  • In the dropdown provided select Okta as the OAuth provider.
  • Enter the Domain Name from Okta.
  • Enter the attribute value against which we received the username in the Postman response.
  • Save the settings.


Step 2: Disable Basic Authentication:

  • Disabling this will restrict all the REST API call made using Basic Authentication.

Test REST API using access token:

  • Call any REST API. Include the access token in the Authorization header. Here’s an example of fetching content from Confluence.
  • Go to the Postman application select method type as GET and enter the Request URL. For eg. http://{Confluence_Base_URL}/confluence/rest/api/content/
  • In the Authorization tab select type as Bearer Token.
  • In the Header tab add the header “content-type: application/json and send the request.
Confluence-Rest-API-Keycloak Request:
     -X GET  
     -H "Authorization: Bearer <Access Token>" 
     -H "Content-type: application/json" 
  • This will show the content in Confluence and will return the status 200.
  • If the token is invalid or missing, the call will return a 401 Unauthorized response

If you are looking for anything which you cannot find, please drop us an email on