Amazon Workspaces app configuration

During this task we will add the Amazon Workspaces app and then assign the app to groups.

Before you begin

  • Ensure that you have the required common UDP port and secret key values available.
    Amazon Workspaces typically used port 1899 vs the default.

Topics

Add app

  1. In Okta, navigate to Applications > Applications> Add Application, search for Amazon Workspaces, and then click Add Application.
  2. Enter a unique name.
  3. In the Sign On tab provide the following:

    Field Value

    Authentication

    Checked.

    UDP Port Required. Typically 1812. Enter the RADIUS application UDP port.
    Secret Key

    Required. Enter the secret key that will be used to encrypt and decrypt the user password.
    Must be identical to that used during the gateway configuration.

    Application username format From the drop-down, select the appropriate username format.
    Important Note

    Important

    The UDP Port and Secret key must match between the app, and the client gateway.

  4. Click Done when complete.

Assign app to groups

  1. Ensure the Assignments tab is selected.
  2. Click Assign and select Assign to Groups.

  3. Locate the group you want to assign the application to and click Assign.
  4. Complete the fields in the Assign Amazon Workspaces to Groups dialog.
  5. Click Save and go back.

    The Assigned button for the group is disabled to indicate the application is assigned to the group.

  6. Optional. Repeat steps 5, 6, and 7 to assign the application to additional groups.
  7. Click Done.
Tip

Tip

For additional information, including guidance on advanced authentication and adaptive multifactor configuration options, see Using the Okta RADIUS App.

Configure MFA factors

  1. Click Security > Multifactor.

  2. Select Factor Types tab.

  3. For each factor being enabled,

    1. Select the factor, for example Okta Verify.
    2. Select Activate in the Inactive/Activate drop down.
      Note: For active factors this drop down includes Active/deactivate values.
    3. Configure factor specific settings as appropriate.

  4. Note; Okta recommends that at a Minimum Okta Verify be specified.

  5. Select the Multifactor tab.

    1. Click Add Multifactor Policy.
    2. Name the policy appropriately.
    3. In Assign to Groups, enter everyone and then click Add.
    4. For Okta Verify select Required.
    5. Click Create Policy.

  6. After adding a policy you are directed to Add Rule automatically. You need not add a rule at this time.