Add the Amazon WorkSpaces app
This topic describes how to add the Amazon WorkSpaces app and then assign it to groups.
Before you begin
Ensure that you have the required common UDP port and secret key values available.
Add the app
- In the Admin Console, go to .
- Click Browse App Catalog.
- Search for and select Amazon Workspaces, and then click Add Integration.
- Enter a unique app label, and then click Next.
- Select the Sign-On Options tab, and then do the following actions:
- Select the Okta performs primary authentication checkbox.
- UDP Port: Enter a port number, like 1812. The UDP port values of the app and the client gateway must match.
- Secret Key: Enter the secret key that's used to encrypt the user password. The secret key for the app and the client gateway must match.
- Application username format: Select an appropriate username format from the dropdown list.
- Update application username on: Determine when the username is updated in the app. You can update it when it's created, or when it's created and updated.
- Enable an authentication protocol:
- Scroll to the Authentication Protocol section of the Sign On tab.
- Click Edit.
- Select an authentication protocol:
- Use EAP-TTLS authentication: Upload the server certificate chain and entity private key. See About certificates. Enter the password used to protect the certificate and key. Okta recommends password-protecting certificates and keys. Select the Transport Layer Security (TLS) version.
- Use PAP authentication: Select this option to use Password Authentication Protocol (PAP) authentication. When you select this option, the Require Message-Authenticator for incoming client requests checkbox appears. Select this option to require and verify the Message-Authenticator attribute and create a more secure authentication process.
- Click Save.
Assign the app to groups
- On the app page, click the Assignments tab.
- Click .
- Find the group that you want to assign the app to and click Assign.
- Repeat for any additional groups.
- Click Done.
For additional information, including guidance on advanced authentication and adaptive multifactor configuration options, see Using the Okta RADIUS App.
Configure the MFA factors
-
In the Admin Console, go to .
- Select the Factor Types tab.
- Do these steps for each factor that you want to enable:
- Select the factor, for example, Okta Verify.
- If a factor is inactive, Inactive appears. Click Inactive and then select Activate. If a factor is active, Active appears. Continue to the next step.
- Configure the factor. See MFA factor configuration.
At minimum, activate and configure Okta Verify.
- Select the Factor Enrollment tab.
- Click Add Multifactor Policy.
- Enter a name for the policy.
- In Assign to groups, start entering the word Everyone, and then select it when it appears.
- Select Required from the dropdown menu beside each factor that you want to activate.
- Click Create policy. The Add Rule page appears. See Configure an MFA enrollment policy.