Using Okta MFA with Google Authenticator
You can configure the connector to authenticate the connection using credentials obtained from Okta MFA with Google Authenticator.
Important:
Ensure that the Google Authenticator factor is enabled on Okta.
To enroll with Okta Google Authenticator:
- Scan the QR code displayed on the browser using the Okta Verify app.
- In the dialog box, type the password from the app.
- Activate the device.
To configure authentication using Okta MFA with Google Authenticator:
- To access the authentication options, open the ODBC Data Source Administrator where you created the DSN, select the DSN, and then click Configure.
- In the Authentication area, click the Authentication Type drop-down list, select Okta.
- In the User field, type the user name associated with your Okta account.
- In the Password field, type the password associated with your Okta user name.
- In the IdP Host field, type the host name of the Okta service.
- In the Okta App ID field, type the Okta-supplied ID associated with your Athena application.
- Optionally, in the Okta App Name field, type the name of your Okta application.
- Optionally, in the Okta MFA wait time field, type the MFA timeout value, in seconds.
- In the Okta MFA Type field, type
googleauthenticator
. - Optionally, in the Preferred Role field, type the Amazon Resource Name (ARN) of the role that you want to assume when authenticated through Okta.
- To save your settings and close the dialog box, click OK.
The following is an example connection string that uses Okta MFA with Google Authenticator:
UID=Scooby;PWD=Scrappy;idp_port=443;idp_host=dev-580551.okta.com;app_id=0oare1348E1NyLw42356/272;okta_mfa_type=GoogleAuthenticator;