On this page
Authenticators overview
Increase the security of your app by requiring a user to verify their identity in more than one way.
Overview
Strengthen your app's sign-in process by adding multiple authentication factors, or ways for a user to confirm their identity. Factors are enabled in the Okta org by creating a policy with one or more authenticators (opens new window), and then assigning that policy to your app.
A policy manages both the types of authenticators (opens new window) and which ones are required or optional. Multifactor authentication (MFA) means that the policy requires at least two factors for a user to sign in. For example, an app can require using Okta Verify in addition to a username and password.
An app must support two flows for an authenticator: enrollment and challenge. A user enrolls an authenticator before using it for the first time. This configures the authenticator for a particular user. For example, they use a QR Code or shared secret to add a time-based one-time passcode (TOTP) generator. New users for apps with MFA enabled enroll the required authenticators when they create an account. Users can also enroll optional authenticators at this point. The enrollment flow also occurs when a new, required authenticator is added to a policy.
The most common flow is challenge. During the challenge flow, the user fulfills the requirements for the authenticator, such as entering a one-time passcode (OTP) or answering a security question.
Okta verifies the user's identity at the end of both flows.
Guides
The following guides step through adding a type of authenticator to your app using the embedded SDK for your platform:
Note: See the Password authenticator (opens new window) page for information on configuring the Password authenticator for your org.
- Okta Email authenticator
- Okta Verify
- Google Authenticator
- Temporary access code (TAC)
- Passkeys (FIDO2 WebAuthn) authenticators, such as a passkey, USB security key, fingerprint, FaceID, or Windows Hello
Note: As of the
2026.04.0release, the FIDO2 (WebAuthn) authenticator is now called Passkeys (FIDO2 WebAuthn) and there are new settings and updates to the authenticator page layout. See Passkeys and WebAuthn.
In each guide, you learn:
- How to enable the authenticator in your Okta org.
- How to add the enrollment and challenge flows to your app for that authenticator.
Note: These guides are for apps that use the embedded SDK deployment model. This offers the greatest level of flexibility and customization, but isn't as secure or maintainable as the embedded Sign-In Widget and redirect models. See Redirect authentication vs. embedded authentication.