Using Okta MFA with Okta Verify

You can configure the connector to authenticate the connection using credentials obtained from Okta MFA with Okta Verify factor.

Important:

Important:

Ensure that the Okta Verify factor is enabled on Okta.

To enroll with Okta Verify with TOTP:

  1. Scan the QR code displayed on the browser using the Okta Verify app.
  2. In the dialog box, enter the password from the app.
  3. Activate the device.

To enroll with Okta Verify with push:

  1. Scan the QR code displayed on the browser using the Okta Verify app.
  2. Approve the push notification sent to your device.

To configure authentication using Okta Verify factor:

  1. To access the authentication options, open the ODBC Data Source Administrator where you created the DSN, select the DSN, and then click Configure.
  2. In the Authentication area, click the Authentication Type drop-down list, select Okta.
  3. In the User field, type the user name associated with your Okta account.
  4. In the Password field, type the password associated with your Okta user name.
  5. In the IdP Host field, type the host name of the Okta service.
  6. In the Okta App ID field, type the Okta-supplied ID associated with your Athena application.
  7. Optionally, in the Okta App Name field, type the name of your Okta application.
  8. Optionally, in the Okta MFA wait time field, type the MFA timeout value, in seconds.
  9. In the Okta MFA Type field, type either oktaverifywithtotp or oktaverifywithpush.
  10. Optionally, in the Preferred Role field, type the Amazon Resource Name (ARN) of the role that you want to assume when authenticated through Okta.
  11. To save your settings and close the dialog box, click OK.

The following is an example connection string that uses Okta Verify with push: 

UID=Scooby;PWD=Scrappy;idp_port=443;idp_host=dev-580551.okta.com;app_id=0oare1348E1NyLw42356/272;okta_mfa_type=oktaverifywithpush;

Related topics