Hello AugmentUser,
Thanks for raising this question in Q&A forum.
I understand that you are encountering error AADSTS50020 when attempting to grant Okta API access to Office 365 because your administrative account is federated via Google.
You do not need to set up a new Developer account or a separate tenant for this. This error occurs because the API consent process for Okta often requires a native Azure AD identity (.onmicrosoft.com) to correctly issue the tokens, rather than a federated identity (Google) which is technically treated as an external user in this context.
Here is the workaround to resolve this immediately within your current environment:
Create a Cloud-Only Admin:
Log in to the Microsoft Entra admin center using your current Google-federated account.
Go to __Users__ > __Create new user__.
__Crucial Step:__ For the domain, ensure you select your default `yourtenant.onmicrosoft.com` domain (do not use your custom Google-federated domain).
Name the user something like `temp-admin` or `breakglass-admin`.
Assign the __Global Administrator__ role to this new user.
__Authorize in Okta:__
Open an __Incognito/Private__ browser window (to ensure no cached Google session interferes).
Log in to your Okta Admin console.
Go to the Office 365 App > __Provisioning__ > __Integration__.
Click __Authenticate with Microsoft Office 365__.
When prompted to sign in to Microsoft, use the __new cloud-only account__ you just created (`******@yourtenant.onmicrosoft.com`).
This bypasses the federation handshake and allows the API token to be generated successfully against your existing tenant.
If helps, approve the answer.
Best Regards,
Jerald Felix