LDAP integration features

The following features support integration with LDAPLightweight Directory Access Protocol (LDAP) is a lightweight client-server protocol for accessing directory services, specifically X.500-based directory services. LDAP runs over TCP/IP or other connection oriented transfer services..

Feature Supported? Description
Delegated AuthenticationAuthentication is distinct from authorization, which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. Authentication methods and protocols include direct auth, delegated auth, SAML, SWA, WS-Fed, and OpenID Connect. No

Ability to authenticate user credentials through LDAP for access into Okta, without performing group and profile information.

Note: LDAP does support JIT authentication which enables Delegated Authentication with LDAP including updates to group and profile information.

JIT Authentication Yes Ability to authenticate user credentials through LDAP for access into Okta, and update group memberships and profile information before access. For more information, see Add and update end users with Just In Time Provisioning.
Instance-level JIT and Delegated Authentication No Ability to delegate authentication on a per LDAP-instance level to support more granular authentication scenarios.
User import from Directory Yes Ability to import user and group details from the directory into Okta. AD supports both full import (full data import) and incremental import (only import changes since last import). For more information, see Import Settings in Install the Okta Java LDAP Agent.
Import filter - OUAn acronym of Organizational Unit. Organizational units are Active Directory containers into which you can place users, groups, computers, and other organizational units. It is the smallest scope or unit to which you can assign Group Policy settings or delegate administrative authority./container selection No Ability to filter users and groupsGroups allow you to organize your end users and the apps they can access. Assigning apps to large sets of end users is made easier with groups. based by specifying an LDAP filter and selecting OUs.
Provision to Directory Yes Ability to provision user and group details down to LDAP. LDAP supports pushing users, password, and groups down to LDAP from Okta. For more information, see LDAP Configuration and Import Settings in Install the Okta Java LDAP Agent.
Self-Service PW Reset Yes Ability to reset LDAP password via Okta. For more information, see Manage users and Enable self-service registration.
PW Sync Yes Ability to sync AD and Okta password. Read this for more info: Using Sync Password
Password Policy
Minimum Length Yes See Security Policies for more info on these.
Complexity Requirements No See Security Policies for more info on these.
Common Password Check No See Security Policies for more info on these.
Enforce password history for last < X > passwords No See Security Policies for more info on these.
Password expires after < X > days No See Security Policies for more info on these.
Prompt user < X > days before password expires No See Security Policies for more info on these.
Lock out user after < X > unsuccessful attempts No See Security Policies for more info on these.
Lock out user after < X number of > minutes No See Security Policies for more info on these.
Show lock out failures No See Security Policies for more info on these.
Send lock out email to user No See Security Policies for more info on these.
Password Soft Lock No Ability to lock the Okta account of LDAP-mastered users via password policies, without triggering a lock of the user's LDAP account.
Password Reset
Self-service recovery options: Email Yes Ability to reset the password through email. For more information, see Factor Type Overview and Configuration in Multifactor Authentication .
Self-service recovery options: SMS Yes Ability to reset the password through a code sent through text message. For more information, see Enable end user self-service password reset using SMS in Manage users.
Self-service recovery options: Voice Call No Ability to reset the password through a code sent through voice call.
Reset, Unlock recovery emails are valid for < X > minutes No Ability to configure how long recovery email tokens are valid for.
Additional self-service recovery option: Secret questions No Ability to reset the password through security questions.
Infrastructure
Multiple agent polling threads No Ability to increase polling threads on the agent. Increases how many requests the agent can handle per second per thread. For more information, see Change the number of Okta Active Directory (AD) agent threads
Top