![]() ![]() In the Key field, enter the string of numbers and letters that you made a note of earlier.In the Account field, enter your Okta username.On your mobile device, launch Google Authenticator.In the field above the Next button, make a note of the string of numbers and letters.In the web browser on your computer, click Can't scan.In the Enter Code field, enter the setup key shown in Google Authenticator on your mobile device.In the web browser on your computer, click Next.Under 'Signing in to Google,' click 2-Step Verification. Your device camera scans the QR code automatically. To store your backup codes somewhere safe, you can print a copy of your backup codes. Tap Scan a QR code and then point your camera at the QR code displayed in the browser on your computer.In Google Authenticator, tap the + sign.Don't click Next in the browser yet instead, on your mobile device, launch Google Authenticator.Perform the QR code scanning steps that apply to you: Select your device type, and then click Next.On the Setup security authenticators page, click Set up.In the web browser on your computer: When signing in to Okta or accessing an Okta-protected resource, enter your credentials and then click Next.If successful, a six-digit one-time passcode will appear at the top of the window. Finally, type your 32-digit secret code (with or without spaces) in the Code section, before selecting Save to save it to the app. In the dashboard you should create new project, where you fill out name of application and few other fields. For Username, type your Google account email address. Go to the Apple App Store or the Google Play Store and install Google Authenticator on your device. Go to the google development console and sign in.In Effective factors, set Google Authenticator to Optional or Required.Select the policy that you want to edit, and then click Edit.To add one or more rules to the policy, see Configure an MFA enrollment policy. Google Sign-In manages the OAuth 2.0 flow and token lifecycle, simplifying your integration with Google APIs.Set Google Authenticator to Optional or Required.On the Factor Enrollment tab, add a new or edit an existing multifactor policy.Enroll Google Authenticator in a multifactor policy. ![]() Click Inactive in the upper right and then select Activate.In Factor Types, click Google Authenticator.In the Admin Console, go to Security Multifactor.Then, users who select it to authenticate are prompted to enter the time-based, six-digit code they see in the Google Authenticator app in Okta.Įnroll Google Authenticator in a multifactor policy Google Authenticator is an app that provides a Time-based One-time Password (TOTP) as a second factor of authentication to users who sign in to environments where multifactor authentication (MFA) is required.Īdmins add Google Authenticator to the list of accepted factors in Okta. First, ensure two-factor authentication is active in the app you want to protect. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |