<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
How to Disable Okta Delegated Authentication for Active Directory
Okta Classic Engine
Directories
Okta Identity Engine
Overview

This article explains how to disable Delegated Authentication for an Active Directory (AD) instance in Okta.

Applies To
  • Directories
  • Active Directory (AD)
  • Delegated Authentication
  • User Management
Solution

When Delegated Authentication is enabled on a directory, Okta does not store passwords for users assigned to that directory. All password-based authentication attempts are delegated to a Domain Controller, and the authentication result is passed back to Okta. When Delegated Authentication is disabled, the assigned Okta users will not have a password unless the Create Okta Password option is selected. 

To disable Delegated Authentication for an Active Directory integration, follow the video or the steps below:

 

  1. Navigate to Directory > Directory Integrations.
  2. Select the AD domain in which the Delegated Authentication option should be disabled.
  3. Click Provisioning > Integration.
  4. Scroll to the header Delegated Authentication and uncheck the box next to Enable Delegated Authentication to Active Directory.
  5. Click Save, and run a full import.

Directory Integrations

Delegated Authentication

When disabling Delegated Authentication, two options are presented:

  1. Create an Okta password (recommended).
    • Choosing this option will send a Password Reset e-mail to all users who previously used Delegated Authentication. Users will need to go through the Password Reset flow to create an Okta Password and log in to Okta.
  1. Do not create an Okta password.
    • Choosing this option will NOT send the Password Reset e-mail, and users will not be able to log into Okta until they set an Okta Password.
    • If this option is chosen, an Okta Password can be created in the following ways:
      • Creating a Temporary Password from the Admin UI (On the user's profile, go to Reset Password Temporary Password).
      • Set a password for the user via API using:
POST {{url}}/api/v1/users/{{userId}} 
with the following body:
{  "credentials": {    "password" : { "value": "Pas$w0Rd123!" }  }} 

NOTE: Organizations can now seamlessly migrate user credentials from Active Directory to Okta, eliminating the need for disruptive, site-wide password resets using the new password migration feature. This streamlined workflow provides the most efficient path for transitioning password authority to Okta, allowing administrators to manage the entire end-to-end migration directly within the Okta Admin Console. To run a password migration campaign, please follow the Run a password migration documentation.

Loading
How to Disable Okta Delegated Authentication for Active Directory