Manage integrations

The Integrations page presents you with a list of all configured integrations and lets you connect ​Akamai MFA​ with third-party systems such as identity providers (IdPs) to provide a seamless MFA service.

With identity providers (IdPs), you can create, manage, and store user identity information. This data is used to authenticate users within federated or distributed networks and grant them access to enterprise resources that they need to perform their work. ​Akamai MFA​ acts as an extra layer of security on top of the verification performed by identity platforms. End users, before they can access corporate resources, have to complete two separate identity verification processes: the primary—with their IdP using their usernames and passwords, and the secondary—using the ​Akamai MFA​ authentication methods (factors). Integrations with IdPs improve your organization’s security posture and provide you with a single point of maintenance of identity data for authentication purposes.

​Akamai MFA​ uses SAML 2.0 (Security Assertion Markup Language 2.0) that is an open standard for exchanging authentication and authorization data to enable single sign-on (SSO) for users. With this solution, users can access all their allowed enterprise apps with a single login.

With Integrations, you can also protect your Unix SSH and Windows local and remote logins by embedding ​Akamai MFA​ as an additional multi-factor step in third-party applications.

Additionally, you can set up a demo integration that lets you experience the ​Akamai MFA​ mobile app used by end-users to self-enroll and authenticate.

On your integration page, you can find a link with installation instructions which take you through the steps necessary to configure the integration.

See the below table to learn about second factors and enrollment methods supported by each of the existing integrations.

IntegrationsSupported authentication methodsSupported enrollment methods
- EAA
IdP
- Microsoft ADFS
- Okta
- SAML
- Shibboleth
- Bypass code
- Magic link
- Email or SMS OTP
- Hardware token TOTP/HOTP
- Phone call
- Phone security key
- Push notification
- ​Akamai MFA​ TOTP
- Third-party OTP devices
- WebAuthn/FIDO2 security key
- Email enrollment
- In-line enrollment
- Unix PAM
- Windows Logon
- Bypass code
- Magic link
- Email or SMS OTP
- Hardware token TOTP/HOTP
- Phone call
- Push notification
- ​Akamai MFA​ TOTP
- Third-party OTP devices

Phone security key and WebAuthn/FIDO2 security key are not supported.
- Email enrollment

In-line enrollment is not supported.
- PacketFence Gateway- Bypass code
- Hardware token TOTP/HOTP
- Phone call
- ​Akamai MFA​ TOTP
- Push notification
- SMS OTP
- Third-party authenticator app as OTP device

Phone security key and WebAuthn/FIDO2 security key are not supported.
Depending on your VPN equipment, this integration supports different use cases that let you onboard new users with:
- Email enrollment
- In-line enrollment