Administration
AMA on September 4: MFA Enforcement for Admin Console
User16370330549592969269

Join us for an online interactive Ask Me Anything (AMA) with Okta product experts as we discuss the recent enforcement of Multi-Factor Authentication (MFA) for Admin Console access. Starting August 2024, single-factor access to the Admin Console will no longer be supported. We’re here to answer your questions, explain the rationale behind this policy change, share tips and best practices, and help you smoothly adjust to this new security policy.


Why this matters? 


MFA is a simple and reliable way to enhance security for application access. By enforcing MFA on the admin console for all Okta tenants, Okta is making a significant step toward protecting your organization’s sensitive information.


We understand that certain use cases may be affected, such as break-glass accounts and shared admin accounts that rely on single-factor access. This AMA will help you understand the impact and ensure you're fully prepared to adopt this change with minimal disruption. 


Why You Should Participate


Understand the Change: Discover why MFA is now required for all Admin Console access and address any concerns about its impact on your organization.


Secure Your Admin Console: Learn how to implement MFA without disrupting key processes.


Best Practices: Explore solutions for common scenarios, such as:

  • Admins federating into the admin console from external identity providers
  • Test automations and RPA account logins
  • Break-glass access and shared privileged account

How will the AMA online event work?


From August 20 to September 3, 2024, submit your questions by replying to this discussion thread using the ‘Answer’ button. Then, mark your calendars for Wednesday, September 4, between 9 a.m. and 11 a.m. PST, when our product experts will be online to provide comprehensive written answers. As a bonus, your participation will earn you points and a special badge.


Ask Questions Now Here!


Featured Product Experts 


Bhagya Prabhakar is a Senior Product Manager at Okta. She leads resource access policies and resource insights.

file (8).jpg

Trevor Thompson is a principal software architect at Okta and drives Okta products towards a secure, unified platform.

file (6).jpg

  • 0 Likes
  • 1 Comment
  • 1061 Views
Skip Feed
  1. Hope this is the right place for this - am I right in thinking that the issue described relates to the default "catch all" rule (named "Catch-all Rule") in the authentication policy named "Okta Admin Console" , and it simply lacks a step require additional factors over and above password?


End of Feed
1 Chatter Feed Items