This article outlines the steps to set up Two-Factor Authentication (2FA) for an Application in Okta Identity Engine (OIE).
- 2FA (Two-Factor Authentication)
- Multi-Factor Authentication (MFA)
- Okta Identity Engine (OIE)
Before starting
- Enable at least one authenticator for the organization. If the organization does not have any authenticators enabled, Okta Verify with a one-time passcode (OTP) is enabled as the default authenticator. If authenticators are configured, then no changes are made.
Enable MFA in the policy
- In the Admin Console, go to Applications > Applications.
- Open the [App Name] App where the 2MFA will be set up.
- Go to Sign On > User authentication, and click View policy details. The Authentication policy for the [App Name] App opens.
- In this policy, go to [App Name] app policy > Actions > Edit. The Edit rule window opens.
- Edit the rule. (See Add an authentication policy rule.)
- Go to User must authenticate with, and then select a 2-factor type option from the dropdown menu.
- Every Sign-in Attempt is recommended, especially for the Okta Admin Console app.
- If multiple authenticators are set to be "optional" other than Okta Verify, then more than one factor will show under Additional factor types.
- Go to User must authenticate with, and then select a 2-factor type option from the dropdown menu.
-
- Select options for Possession factor constraints are.
- Click Save.
Watch the following Demo video:
NOTE: For enforcing MFA to access the Okta Admin Console, please review Enable MFA for the Admin Console for more information.
