On this page
Authenticators overview
Increase the security of your app by requiring a user to verify their identity in more than one way.
Overview
Strengthen your app's sign-in process by adding multiple authentication factors, or ways for a user to confirm their identity. Factors are enabled in the Okta org by creating a policy with one or more authenticators (opens new window), and then assigning that policy to your app.
A policy manages both the types of authenticators (opens new window) and which ones are required or optional. Multifactor authentication (MFA) means that the policy requires at least two factors for a user to sign in. For example, an app can require using Okta Verify in addition to a username and password.
An app must support two flows for an authenticator: enrollment and challenge. A user enrolls an authenticator before using it for the first time. This configures the authenticator for a particular user. For example, they use a QR Code or shared secret to add a time-based one-time passcode (TOTP) generator. New users for apps with MFA enabled enroll the required authenticators when they create an account. Users can also enroll optional authenticators at this point. The enrollment flow also occurs when a new, required authenticator is added to a policy.
The most common flow is challenge. During the challenge flow, the user fulfills the requirements for the authenticator, such as entering a one-time passcode (OTP) or answering a security question.
Okta verifies the user's identity at the end of both flows.
Guides
The following guides step through adding a type of authenticator to your app using the embedded SDK for your platform:
Note: See the Password authenticator (opens new window) page for information on configuring the Password authenticator for your org.
- Okta Email authenticator
- Okta Verify
- Google Authenticator
- Temporary access code (TAC)
- FIDO2 (WebAuthn) authenticators, such as a USB security key, fingerprint, FaceID, or Windows Hello
Early Access
Note: When the Passkeys Rebrand self-service Early Access feature is enabled, the FIDO2 (WebAuthn) authenticator is called Passkeys (FIDO2 WebAuthn), and there are new settings and updates to the authenticator page layout.
See Configure the FIDO2 (WebAuthn) authenticator (opens new window) and
settings(opens new window). To enable the Passkeys Rebrand feature, see Enable self-service features (opens new window).
In each guide, you learn:
- How to enable the authenticator in your Okta org.
- How to add the enrollment and challenge flows to your app for that authenticator.
Note: These guides are for apps that use the embedded SDK deployment model. This offers the greatest level of flexibility and customization, but isn't as secure or maintainable as the embedded Sign-In Widget and redirect models. See Redirect authentication vs. embedded authentication.