Using Okta MFA with Okta Verify
You can configure the connector to authenticate the connection using credentials obtained from Okta MFA with Okta Verify factor.
Important:
Ensure that the Okta Verify factor is enabled on Okta.
To enroll with Okta Verify with TOTP:
- Scan the QR code displayed on the browser using the Okta Verify app.
- In the dialog box, enter the password from the app.
- Activate the device.
To enroll with Okta Verify with push:
- Scan the QR code displayed on the browser using the Okta Verify app.
- Approve the push notification sent to your device.
To configure authentication using Okta Verify factor:
- To access the authentication options, open the ODBC Data Source Administrator where you created the DSN, select the DSN, and then click Configure.
- In the Authentication area, click the Authentication Type drop-down list, select Okta.
- In the User field, type the user name associated with your Okta account.
- In the Password field, type the password associated with your Okta user name.
- In the IdP Host field, type the host name of the Okta service.
- In the Okta App ID field, type the Okta-supplied ID associated with your Athena application.
- Optionally, in the Okta App Name field, type the name of your Okta application.
- Optionally, in the Okta MFA wait time field, type the MFA timeout value, in seconds.
- In the Okta MFA Type field, type either
oktaverifywithtotp
oroktaverifywithpush
. - Optionally, in the Preferred Role field, type the Amazon Resource Name (ARN) of the role that you want to assume when authenticated through Okta.
- To save your settings and close the dialog box, click OK.
The following is an example connection string that uses Okta Verify with push:
UID=Scooby;PWD=Scrappy;idp_port=443;idp_host=dev-580551.okta.com;app_id=0oare1348E1NyLw42356/272;okta_mfa_type=oktaverifywithpush;
Related topics
- Security and Authentication
- Configuring Authentication
- Authentication Driver Configuration Options