See Get verification codes with Google Authenticator. Open the Actions dropdown menu beside the authenticator, and then select Edit or Delete.Įnd users must install the Google Authenticator app on their mobile device and add an account to it for their Okta org.Tap Begin in the Google Authenticator app or tap the + if youve already linked another account. If your key has a gold tip, tap and then press it. Locate the key or bar code provided by your online account. From now on, get a full-screen experience of your app with keyboard and mouse. Activate your key: If your key has a gold disc, tap it. Stop worrying about overcharges when using Google Authenticator on your cellphone, free yourself from the tiny screen and enjoy using the app on a much larger display. If you see a message from 'Google Play services,' select OK. Connect your key to the USB port in your computer. In Authenticators, go to the Setup tab. Your device will detect that your account has a security key.See Create an authenticator enrollment policy.īefore you edit or delete the authenticator, you may have to update existing policies that use this authenticator. Add the authenticator to a new or an existing authenticator enrollment policy.On the Setup tab, click Add Authenticator.Īdd the Google Authenticator to the authenticator enrollment policy In the Admin Console, go to Security Authenticators. This authenticator is a possession factor, fulfills the requirements for user presence, and is device-bound. The Google Authenticator app allows a time difference on the end-user device of up to two minutes earlier or later than the time in the Google Authenticator app. These attempts are registered in the System Log. When a user exceeds the rate limit, they can’t sign in until the rate limit passes. The rate limit is a total of five unsuccessful attempts from any or all of these authenticators within a rolling five-minute period. These authenticators include Google Authenticator, Symantec VIP, and YubiKey OTP. Okta enforces a rate limit on unsuccessful authentication attempts from Okta-enrolled third-party OTP authenticators. Then, users who select it to authenticate are prompted to enter the time-based, six-digit code they see in the Google Authenticator app in Okta. Google Authenticator provides a Time-based One-time Password (TOTP) that enables users to authenticate themselves in Okta.Īdmins add Google Authenticator to the list of accepted authenticators in Okta.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |