Use multifactor authentication with the LDAP Interface

If your orgThe Okta container that represents a real-world organization. has implemented MFA for adminAn abbreviation of administrator. This is the individual(s) who have access to the Okta Administrator Dashboard. They control the provisioning and deprovisioning of end users, the assigning of apps, the resetting of passwords, and the overall end user experience. Only administrators have the Administration button on the upper right side of the My Applications page. users, you need to include your MFA token information and your admin password when you sign in to the LDAPLightweight Directory Access Protocol (LDAP) is a lightweight client-server protocol for accessing directory services, specifically X.500-based directory services. LDAP runs over TCP/IP or other connection oriented transfer services. Interface.

The format for entering your password and MFA token is:

<password,MFAtoken>

For example, you enter the following for Okta Verify:

password,123456

where password is your admin user password, and 123456 is the Okta Verify passcode.

For SMS-based and voice verification, the token needs to be generated prior to doing the BIND. For example, after you sign in and press Send Code, resulting in an SMS being sent to the phone. You can then do a BIND and SEARCH with that SMS in the format of password, text code.

Top