Managing external identities to enable secure access for partners, customers, and other non-employees
The behavior described cannot be fully explained or diagnosed with the available information in the provided context.
The context confirms the following about Microsoft Entra External ID and custom OIDC providers:
- External tenants support OpenID Connect and the authorization code flow, including PKCE, as well as other OAuth2/OIDC flows.
- Custom OIDC identity providers can be configured and then added to user flows so they appear as sign-in options on the hosted page.
- When adding a Microsoft Entra ID tenant as an OIDC IdP, the IdP is configured under All identity providers and then explicitly added to a user flow so it appears on the sign-in page.
- The same pattern applies to other OIDC IdPs (for example, Microsoft account or Google): configure the IdP, then add it under Identity providers in the user flow.
- Claims and attributes from the external IdP are only stored if the corresponding attributes are enabled in the user flow, but this affects what is stored and emitted in tokens, not whether the IdP button appears.
From the context, the only supported, documented conditions for an OIDC IdP to appear on the External ID login screen are:
- The OIDC IdP is successfully created under External Identities → All identity providers.
- The OIDC IdP is explicitly added to the specific user flow under User flows → [flow] → Identity providers.
If both conditions are met, the IdP should appear as a sign-in option. The context does not document any special-case incompatibility or filtering logic for Okta as an OIDC provider, nor any additional hidden requirements (such as specific discovery document fields, specific claim sets, or redirect URL patterns) that would cause the provider to be silently hidden.
The context also does not provide a normative list of valid redirect/callback URL formats for third‑party OIDC IdPs such as Okta, beyond showing that for apps in external tenants the authority format for MSAL-based applications is https://<tenant-name>.ciamlogin.com/ and that external IdPs are added to user flows as sign-in options.
Because of this, the following questions cannot be definitively answered from the context:
- The specific reason why the Okta OIDC provider does not appear on the External ID login screen in this scenario.
- Whether there is a known incompatibility between External ID’s custom OIDC federation and Okta specifically.
- Whether any particular field in Okta’s discovery document or token format is causing External ID to hide the provider.
- Whether the exact redirect URL patterns listed are correct for Okta → External ID OIDC federation.
Only the general, documented behavior can be stated:
- External tenants support custom OIDC IdPs, which must be configured and then added to user flows to appear on the sign-in page.
- Identity providers (including custom OIDC IdPs) are one of several sign-in options that can be configured and then integrated into a sign-up/sign-in user flow.
- Claims mapping and user flow attribute configuration control what is stored and emitted, not whether the IdP button appears.
References:
- Supported features in workforce and external tenants
- Identity providers for external tenants
- Planning for customer identity and access management
- Add a Microsoft Entra ID tenant as an OpenID Connect identity provider (Preview)
- Add Microsoft account (live.com) as an OpenID Connect identity provider
- OpenID Connect claims mapping