External Authentication Method (EAM) for Microsoft Entra ID allows Entra ID to leverage an external authentication provider like Okta as a Multi-factor Authentication (MFA) provider within Entra ID Policy, reducing the overhead requirement to configure and manage both Okta Verify and Windows Hello authenticators across both platforms. When configuring Okta as an External Authentication Method (EAM) for Microsoft Entra ID, it will be necessary to translate the Microsoft user GUID to the Okta Application User Profile to complete the EAM link. It is possible to do this manually or via API, but one possible method would be to use a Workflow like the following example.
NOTE: This is not related to Office 365 (O365) or Microsoft 365 (M365) and does not impact provisioning on those apps. It is a configuration isolated to Microsoft's EAM MFA function and Okta EAM integration configuration.
- Okta Identity Engine (OIE)
- External Authentication Method (EAM) for Entra ID via Okta
- Microsoft Azure AD
- Workflows
As outlined in the EAM documentation, it is necessary to map the Microsoft user ID into the Okta EAM App User Profile for the users assigned to the EAM app in Okta. This is outside the scope of the initial application setup and requires a manual or custom solution to insert the expected profile data.
Build a new flow using the example EAM.flow described below as a starting point template for this requirement.
- Complete EAM application configuration in Okta and EntraID as documented. Save the Okta application ID.
- The example flow is not available as a template and cannot be directly attached here, so it will be necessary to create a new flow.
- Configure cards as shown in the flow screenshot below.
- Configure and select the connectors for the Okta org and Azure AD environment.
- Configure the first and final workflow card settings to utilize the EAM application that was previously created in Okta.
- Enable the flow and ensure test users successfully complete the flow with the updated App User Profile result.
See the flow connection methodology below:
Flow Outline:
- Get the assigned user's Okta ID.
- Read that user email attribute.
- Read the Azure User ID for that email.
- Compose a property in JSON format using that Azure User ID.
- Update the assigned Application User Profile with the mapped Azure User ID.
NOTE: 404 errors are expected if the user's email does not exist in Azure.
- Consider building additional error-handling logic or reporting cards into the flow to increase resilience.
