Book Image

Okta Administration: Up and Running

By : Lovisa Stenbäcken Stjernlöf, HenkJan de Vries
Book Image

Okta Administration: Up and Running

By: Lovisa Stenbäcken Stjernlöf, HenkJan de Vries

Overview of this book

IAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you’ll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers. Once you’ve understood how Okta can be used as an IAM platform, you’ll learn about the Universal Directory, which covers how to integrate other directories and applications and set up groups and policies. As you make progress, the book explores Okta’s single sign-on (SSO) feature and multifactor authentication (MFA) solutions. Finally, you will delve into API access management and discover how you can leverage Advanced Server Access for your cloud servers and Okta Access Gateway for your on-premises applications. By the end of this Okta book, you’ll have learned how to implement Okta to enhance your organization's security and be able to use this book as a reference guide for the Okta certification exam.
Table of Contents (13 chapters)
1
Section 1: Getting Started with Okta
8
Section 2: Extending Okta

Basic MFA settings

Before deep-diving into Okta's adaptive functionalities, let's look at the basic settings that are available in the Single Sign-On (SSO) licenses. It's possible to set MFA both when signing in to Okta and when signing in to applications. Different levels of security and factors can be set for different logins. As an example, if Okta Verify is determined as safe enough to log in to Okta, biometrics might be added as a factor to log in as an administrator to a business-critical system. Before we can do anything, we have to enable the different kinds of factors available that you want to allow your end users to be able to enroll in. Navigate to Security | Multifactor in the top menu in the administrator console. On the first tab, you will choose which factors you want your end users to be able to use. Remember, any factors you enable aren't mandatory to all end users and are not active until end users actually enroll in them. You have your end users...