Book Image

Okta Administration Up and Running - Second Edition

By : HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
Book Image

Okta Administration Up and Running - Second Edition

By: HenkJan de Vries, Lovisa Stenbäcken Stjernlöf

Overview of this book

Identity and access management (IAM) is a set of policies and technologies used to ensure an organization’s security, by carefully assigning roles and access to users and devices. This book will get you up and running with Okta, an IAM service that can help you manage both employees and customers. The book begins by helping you understand how Okta can be used as an IAM platform, before teaching you about Universal Directory and how to integrate with other directories and apps, as well as set up groups and policies for Joiner, Mover, and Leaver flows. This updated edition helps you to explore agentless desktop single sign-on (SSO) and multifactor authentication (MFA) solutions, and showing how to utilize Okta to meet NIST requirements. The chapters also walk you through Okta Workflows, low-/no-code automation functionalities, and custom API possibilities used to improve lifecycle management. Finally, you’ll delve into API access auditing and management, where you’ll discover how to leverage Advanced Server Access (ASA) for your cloud servers. By the end of this book, you’ll have learned how to implement Okta to enhance your organization's security and be able to use the book as a reference guide for the Okta certification exam.
Table of Contents (14 chapters)
1
Part 1:Getting Started with Okta
8
Part 2: Extending Okta

MFA enrollment

Before we can do anything, we must enable the different kinds of authenticators that we want to allow our end users to be able to enroll in. Navigate to Security | Authenticators. On the first tab, you will choose which authenticators you want to be available. Remember, any authenticators you enable aren’t mandatory to all end users and are not active until end users enroll themselves in them. You can have your end users enroll in them by using a combination of global session policies, enrollment policies, and authentication policies. We will be able to create policies and assign them to different groups or users in the same way as we did for sign-on in Chapter 3, Using Single Sign-On for a Great End User Experience. Figure 4.23 shows the authenticators that are available when you click Add Authenticator:

Figure 4.23 – Authenticators that are available to add and information on which are already enabled

Figure 4.23 – Authenticators that are available to add and information on which are already enabled

Click Add under any...