The end-user experience depends on whether users are already enrolled in Duo Security before you configure it as an authenticator in Okta. To add one or more rules to the policy, see Configure an authenticator enrollment policy rule.In the Eligible authenticators list, set Duo Security to Optional or Required.Select the policy that you want to edit, and then click Edit.Set Duo Security to Optional or Required.On the Enrollment tab, add a new or edit an existing multifactor policy:.In the Admin Console, go to Security > Authenticators.End-user settings in the Duo Mobile appĮnroll Duo Security in a multifactor policy.Enroll Duo Security in a multifactor policy.Depending on your Okta integration settings in Duo Security, end users can enroll with a smartphone, tablet, telephone, Touch ID, and security keys. You can change username mapping as described in this topic.Įnd users without an existing Duo Security enrollment can self-enroll during sign-in or through their Duo Security account page. When a user signs in to Okta or accesses an Okta-protected resource, Okta looks up the user in your Duo Security account according to the user’s Okta username or email address. If you have a Duo Security deployment with existing enrollments, make sure that your Duo Security usernames match the Okta usernames or email addresses of your Okta users. When enabled as an authenticator, Duo Security is the system of record for MFA and Okta delegates secondary verification of credentials to your Duo Security account. You can add Duo Security as a multifactor authentication (MFA) option in Okta.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |