Reference Guide
...
External MFA Providers
Okta MFA Integration
4 min
for okta integration, users should log in to okta with the email addresses defined in single connect after logging in to the okta portal, token verification can be done through different verification methods to use the okta verification method, users must download the okta verify mobile app okta verify should be activated from the user portal settings area, followed by a scan of the barcode that appears on the portal’ mobile application section users should also download the google authenticator mobile app if they wish to use the google authenticator method the google authenticator should be activated from the user portal settings area, followed by a scan of the barcode that appears on the portal’ mobile application section single connect integrates with okta via api, as long as certain parameters are defined in single connect api key (the api key is created by okta for each customer environment) url (the url is unique for each customer environment) to adjust the okta integration settings navigate to administration > system config manager set the following parameters mfa provider=okta (default internal) mfa external provider okta apikey=xxx (encrypted) mfa external provider okta hostname mfa external provider okta factor={token\ software\ totp, sms, push} (default token\ software\ totp) mfa external provider okta totpprovider={google, okta} (default google) with okta enabled, the token can be sent in different ways token\ software\ totp token in the mobile app is used (okta verify or google authenticator) sms token is sent by sms push verification is confirmed from the mobile application (okta verify)