diff --git a/openmetadata-docs/content/deployment/security/okta/index.md b/openmetadata-docs/content/deployment/security/okta/index.md
index e3c84261ef6..fb4324099d1 100644
--- a/openmetadata-docs/content/deployment/security/okta/index.md
+++ b/openmetadata-docs/content/deployment/security/okta/index.md
@@ -50,8 +50,8 @@ This document will explain how to create an Okta app and configure it for OAuth.
- The app is now configured.
-### Step 4: Add Authorization Server to get the Issuer URL
-It is recommended to create a separate authorization server for different applications. The authorization server needs an endpoint, which'll be the Issuer URL.
+### Step 4: Add Authorization Server to get the Issuer URL (optional)
+This step and the following ones are not mandatory. It is recommended to create a separate authorization server for different applications. The authorization server needs an endpoint, which'll be the Issuer URL.
- Click on **Security -> API** in the left navigation panel.
@@ -65,14 +65,14 @@ It is recommended to create a separate authorization server for different applic
This will generate the Issuer URL.
-### Step 5: Change the Issuer URL from Dynamic to Okta URL
+### Step 5: Change the Issuer URL from Dynamic to Okta URL (optional)
Once the Authorization Server has been added, navigate to Security >> API >> Authorization Servers and click on the authorization server created in the previous step.
The Issuer URL shows up as Dynamic by default. Change the Issuer URL to Okta URL and save the changes.
-### Step 6: Create a Default Scope
+### Step 6: Create a Default Scope (optional)
- To create a default scope from **Security -> API**, click on the required **Authorization Server**.
@@ -83,7 +83,7 @@ The Issuer URL shows up as Dynamic by default. Change the Issuer URL to Okta URL
- Set as a **Default Scope**.
-## Step 7: Add New Access Policy and Rule
+## Step 7: Add New Access Policy and Rule (optional)
- From **Security -> API**, click on the required **Authorization Server**
- Navigate to the **Access Policies Tab**
- Click on **Add New Access Policy**
@@ -97,7 +97,7 @@ The Issuer URL shows up as Dynamic by default. Change the Issuer URL to Okta URL
- Click on **Create Rule** to save the changes.
-### Step 8: Where to Find the Credentials
+### Step 8: Where to Find the Credentials (optional)
- Once the app is configured, the **Client ID** can be used.
- You can also go to **Application -> Application** as in step 2.
- You should be able to see your application in the list.