OIE CIAM Delta Lab Guide
OIE CIAM Delta Lab Guide
OIE CIAM Delta Lab Guide
Duration 10 minutes
Duration 10 minutes
Users needing the Okta Browser Plugin app can be required to use the sign-on policy
associated with that app to gain access.
Create Multifactor Policy
1. From the Okta Admin Console, navigate to Security > Authenticators.
2. Observe that Email, Okta Verify, Password and Phone have already been added by
default.
3. Click Add Authenticator.
4. Click Add Under Google Authenticator.
5. Click Add.
6. Click Actions drop-down menu found at the far right of the Password
Authenticator.
7. Click Edit.
8. Observe this is the Default Policy for authenticating Okta-sourced users.
9. Click Back to all Authenticators.
10. Click Enrollment.
11. Click Add Multifactor Policy.
12. Configure the various fields and options in the following manner:
● Policy Name: Enrollment Policy
● Policy Description: Enrollment Policy for Marketing
● Assign to Groups: Marketing
● Make Google Authenticator required.
13. Click Create Policy.
Okta Ice would like to implement Email Magic Link for their Customer
Scenario
Portal.
What’s a magic link? Magic links allow users to log in via a link sent to an email address
without users having to provide any login credentials to sign in. It’s a form of passwordless
login. There are 3 main steps:
1. Users enter an email address at the Okta sign-in screen.
2. If the email is registered, the user will receive an email with a magic link.
3. User opens their email and clicks on Sign In.
Email Magic Link Test User Creation
5. Click Save.
Configure the Okta Sign On Policy
1. In the Admin Console, go to Security > Authentication Policies.
2. Click Add a Policy.
3. Name the policy Magic Link.
4. Click Save.
5. Click Add Rule.
6. Name the rule Email Magic Link Rule.
7. Next to User's group membership includes, click the drop-down and select At
least one of the following groups.
Okta Ice has a new application that they are deploying and would like to
Scenario have the end users authenticate using password and a one-time code
sent to the users email.
Scenario Okta Ice would like to add Flexible Account Recovery to App D.
Okta Ice would like for users to perform password management such as
self-service password recovery, change their own passwords, and
Scenario
unlock account management using either email or phone (voice call or
text.)
Duration 10 minutes
Add an Authenticator
1. Navigate to Security > Authenticators.
2. Click the Actions Menu to the far right of the Phone authenticator and click Edit.
3. Use the checkboxes to confirm the user can verify with:
a. Voice Call.
b. SMS.
1. Sign out.
2. On the log in page enter Jacob’s username: [email protected].
3. Enter Jacob’s password: Tra!nme4321
4. Click Verify.
5. Click Jacob > Settings.
6. Under Security Methods click Setup next to Phone.
7. Enter Jacob’s password and then click Verify.
8. Click Setup under Phone.
You may be required to satisfy MFA using your password and Google
Authenticator, configured earlier in this training. Once MFA has been satisfied you
can continue.
9. Enter your mobile phone number for SMS.
10. Click Receive a code via SMS.
11. Enter code and click Verify.
12. Repeat the process but this time choose Voice Call.
Can Jacob Ramsey use the Phone Authenticator to change his password?
1. Sign out.
2. On the login page enter Jacob’s username: [email protected].
3. Click Next.
4. Click Forgot Password?
5. You should see two options (email or phone.)
6. Select phone.
7. You should see two options SMS or Voice Call.
8. Choose Receive a Code via SMS.
9. Enter the code.
10. Change Jacob’s password.
Okta Ice would like to increase their org security by adding CAPTCHA to
Scenario
prevent automated sign-up attempts.
Okta supports CAPTCHA to prevent automated sign-in attempts. You can integrate either
of two services: hCaptcha or reCAPTCHA v2.
The vendor implementations supported by Okta are both invisible; they each run
risk-analysis software in the background during sign in to determine the likelihood that the
user is a bot. This risk analysis is based on the settings that you configure for the service.
Configure CAPTCHA Using Google
Note: The vendor implementations supported by Okta are both invisible; they each run
risk-analysis software in the background during sign in to determine the likelihood that the
user is a bot.
1. Navigate to https://www.google.com/recaptcha/admin/create.
2. Label: Application A.
3. Select reCAPTCHA V2 radio button.
a. Select Invisible reCAPTCHA badge radio button.
4. Domains: xxxxxxx.oktapreview.com
5. Click the checkbox for Accept the reCAPTCHA Terms of Service.
6. Click Submit.
7. Save the Site key to Notes.
8. Save the Secret key to Notes.