Using Okta MFA with Google Authenticator
You can configure the connector to authenticate the connection using credentials obtained from Okta MFA with Google Authenticator.
Important:
Ensure that the Google Authenticator factor is enabled on Okta.
To enroll with Okta Google Authenticator:
- Scan the QR code displayed on the browser using the Okta Verify app.
- In the dialog box, type the password from the app.
- Activate the device.
To configure authentication using Okta MFA with Google Authenticator:
- Set the
AuthenticationType
property toOkta
. - Set the
UID
property to the user name associated with your Okta account. - Set the
PWD
property to the password associated with your Okta user name. - Set the
IdP_Host
property to the host name of the Okta service. - Set the
App_ID
property to the Okta-supplied ID associated with your Athena application. - Optionally, set the
okta_mfa_wait_time
property to the MFA timeout value, in seconds. - Set the
okta_mfa_type
property toGoogleAuthenticator
. - Optionally, set the
Preferred_Role
property to the Amazon Resource Name (ARN) of the role that you want to assume when authenticated through Okta. - Optionally, set the
App_Name
property to the name of your Okta application.