All users must use Multi-Factor Authentication (MFA) to access the Okta Support Center (support.okta.com). This mandatory security measure improves our customers’ security posture and makes it more difficult for malicious users to access sensitive data, and enhances the site's security.
- Okta Support Center
How do I log in to the Okta Support Center as a customer?
The login process varies depending on whether your organization uses Okta Identity Engine (OIE) or Okta Classic. Follow the specific instructions for your environment:
Accessing the Support Center via Okta Identity Engine (OIE)
- Navigate to support.okta.com and click Log In.
- Click the button labeled Continue with Okta Workforce Identity Cloud.
- Enter your Organization URL (e.g., company.okta.com) and click Continue.
- Complete the MFA prompt as required by your organization's security policy.
- If using FastPass, you will be authenticated and redirected to the Support Center.
- If FastPass is not used, you will be asked for a password or to use another authenticator (Google Authenticator or another time-based one-time passcode (TOTP), or Auth0 Guardian App) depending on your organization’s authentication policy.
Accessing the Support Center via Okta Classic
- Navigate to support.okta.com and click Log In.
- Click the button labeled Continue with Okta Workforce Identity Cloud.
- Enter your Organization URL (e.g., company.okta.com) and click Continue.
- Enter your Username and Password.
- Provide your additional factor depending on your organization’s authentication policy (Google Authenticator or another time-based one-time passcode (TOTP), or Auth0 Guardian App).
- If you did not use at least 2 factors, one of which is strong, you will be requested to Keep Your Account Safe by adding another authentication method. (Google Authenticator or similar, or Auth0 Guardian App).
- Save the recovery key.
- Enroll a passkey for faster login.
What are the MFA configuration tips for Okta Admins?
Admins can ensure a seamless login experience for their users by configuring a global session policy that requires MFA and the Authentication Policy that applies to the Okta Dashboard requiring at least one strong authenticator. These strong factors are available to all customers with the exception of Okta Verify - Push, which requires the MFA or an MFA SKU. The process varies depending on whether your organization uses Okta Identity Engine (OIE) or Okta Classic. Follow the specific instructions for your environment:
Admin Tips for Okta Identity Engine (OIE)
- Authentication Policy: Ensure the policy assigned to the Okta Dashboard app requires at least two authentication factors, one of which should be Okta Verify - FastPass, Okta Verify - Push, FIDO2/WebauthN Security Key, or Google Authenticator.
- Global Session Policy: Create a global session policy to require MFA.
Admin Tips for Okta Classic
- Okta Sign-On Policy: Ensure at least one strong authenticator (like Okta Verify - push or FIDO2/WebauthN Security Key) is active for the Okta sign-on policy.
- Upgrade to OIE (Free): Provides increased control over protecting your apps and resources. Learn more about how you can upgrade to OIE.
If you are a Federal customer or want to create an Okta Digital Experience account
Follow the process to create an Okta Support Center account.
What should I do if I am still unable to access my account?
If you are still experiencing login or account recovery issues, follow these recover procedures:
- Okta users: Contact your internal IT team (Okta administrator) who will have the required access and permissions to assist further.
- Okta administrators who are the sole user administrator: Send an email to community@okta.com from the associated address.
Follow this 5-minute video on using MFA on the Okta Support Center.
Related References
- Product Update - Upcoming Okta Security Enhancements
- How to Create a Community-Only Account on the Okta Help Center
