Okta
If you're using Okta as your identity management platform, you can integrate it with Akamai MFA to provide two sources of validation for your on-premises, mobile and third-party cloud application.
With this integration, users have to authenticate first with Okta, and then they are redirected to Akamai MFA for secondary verification.
See this diagram that presents a conceptual model of the authentication process. For clarity reasons, some traffic flows are not covered.
This authentication process refers to users who are enrolled in Akamai MFA.
-
The user attempts to access the protected enterprise application.
-
The user is prompted to log in using their credentials.
-
Upon successful authentication, Okta redirects the user to Akamai MFA.
-
Akamai MFA challenges the user with secondary authentication.
-
The user confirms their identity using the selected secondary authentication method.
-
Akamai MFA redirects the user to Okta.
-
Okta redirects the user to the application server.
-
The user gains access to the application.
Prerequisites
-
Sign up for an Okta account.
-
IdP factor authentication Okta's early access feature is used as the integration point. Contact Okta to enable this capability.
Add Okta integration
Follow this procedure to generate the security components to supply your Okta tenant and, later, enable the communication between Akamai MFA and Okta.
-
In the Enterprise Center navigation menu, select Multi-factor Authentication > Integrations.
-
Click Add Integration (+).
-
In Integration Type, select Okta.
-
In Name, enter a unique name for your Okta integration.
-
Click Save and Deploy.
You’ve just generated your Issuer URI, SSO URL, and Certificate. This data will be available for you on the integration page. Your integration credentials can be copied anytime and used to configure the integration in the Okta Admin portal.
Configure Akamai MFA in Okta
Follow these steps to configure Akamai MFA in the Okta admin console. With this configuration, you enable a connection between Akamai MFA and Okta via SAML protocol.
-
Log in to your Okta account at
https://<your tenant name>.okta.com
. Click Admin to get into your administrator console. -
Go to Security > Identity Providers.
-
Click Add identity provider, select SAML 2.0 IdP, and click Next.
The Configure SAML 2.0 IdP page opens. -
In General settings, enter the Akamai MFA integration name.
-
In Authentication settings, select Factor only in IdP Usage.
-
In SAML protocol settings, paste the data copied from Akamai MFA integration page: Issuer URI, SSO URL, Certificate.
-
Click Finish.
-
On the Edit IdP page, navigate to Summary and click Download metadata.
-
Go back to the Okta integration in Akamai Control Center, and in Okta SP Settings click Provision.
-
In the Upload Okta Metadata dialog, click Metadata (the orange folder icon), and select the
metadata.xml
file that you previously downloaded by clicking Upload. When metadata displays in Metadata Content, click Upload to confirm.
The uploaded metadata appears in the Okta SP Settings section. -
Go back to the Okta portal.
-
Go to Security > Multifactor.
-
Click IdP Factor.
The IdP Factor page opens. -
Select your newly added IdP from the list and click Save.
-
To enable the IdP Factor, click Active.
Test your configuration
Follow these steps to create a group of testers and add a policy describing the sign-on rules. With those settings, you can check how your newly created integration works.
Testing your setup allows you to experience the end users' authentication process.
This step is optional.
Create a group for test users
-
Log in to Okta Portal as an administrator.
-
Go to Directory > Groups.
-
Click Add Group.
-
Enter Group name and click Add Group.
Create users
-
Log in to Okta Portal as administrator.
-
Go to Directory > People.
-
Click Add Person.
-
Fill in obligatory fields and click Save or Save and Add Another to continue adding test users.
Create a policy
-
Log in to Okta Portal as an administrator.
-
Go to Security > Authentication.
-
Click Sign On.
-
Click Add New Okta Sign-On Policy.
-
Add Policy Name and assign the previously created group.
-
Click Create Policy and Add Rule.
Add a rule
-
Set rule conditions. Remember to select Required in Multifactor authentication (MFA) is to activate secondary authentication.
-
Click Create Rule.
Now that you added testers and set the authentication policy, you can start testing your setup.
To learn more about setting up Okta sign-on policies and rules, see Configure an Okta sign-on policy in Okta documentation.
To learn how to configure an app sign-on policy, see Configure an app sign-on policy in Okta documentation. When setting up your app sign-on policy, make sure to select Prompt for factor to activate secondary authentication.
Test your setup
-
Use test user credentials to log in to Okta Portal.
-
Immediately you're informed about the secondary authentication factor and prompted to self-enroll. Click Configure factor.
-
Click Enroll to configure the secondary authentication factor.
-
You are redirected to the Akamai MFA mobile app. Click Enroll a Device to start the self-enrollment process.
See For Users to learn about the details of the self-enrollment process in the service.
Updated over 1 year ago