Using Okta MFA with Google Authenticator

You can configure the connector to authenticate the connection using credentials obtained from Okta MFA with Google Authenticator.

Important:

Ensure that the Google Authenticator factor is enabled on Okta.

To enroll with Okta Google Authenticator:

  1. Scan the QR code displayed on the browser using the Okta Verify app.
  2. In the dialog box, type the password from the app.
  3. Activate the device.

To configure authentication using Okta MFA with Google Authenticator:

  1. Set the AuthenticationType property to Okta.
  2. Set the UID property to the user name associated with your Okta account.
  3. Set the PWD property to the password associated with your Okta user name.
  4. Set the IdP_Host property to the host name of the Okta service.
  5. Set the App_ID property to the Okta-supplied ID associated with your Athena application.
  6. Optionally, set the okta_mfa_wait_time property to the MFA timeout value, in seconds.
  7. Set the okta_mfa_type property to GoogleAuthenticator.
  8. Optionally, set the Preferred_Role property to the Amazon Resource Name (ARN) of the role that you want to assume when authenticated through Okta.
  9. Optionally, set the App_Name property to the name of your Okta application.