Use the Okta Privileged Access client
Every Okta Privileged Accessclient command uses the syntax:
sft [global options] command [command options] [arguments...]
Global options
You can use the following options with any client command:
-
-h,--help: Displays help. -
-v,--version: Displays version.
Topics
Client commands
| Command | Description | Options |
|---|---|---|
sft ad list-domains
|
List Active Directory domains. |
|
sft ad list-accounts
|
List Active Directory accounts. |
|
sft ad reveal
|
Reveal the password associated with an Active Directory (AD) account. |
|
sft list-checked-out-resources
Note:
Checkout is automatically applied when |
List checkout resources. |
|
sft checkin
|
Check in a resource. |
|
sft config
|
Gets and sets client configuration options. See Configure the client. |
|
sft dash
|
Opens your team's dashboard in your browser. |
|
sft device-info
|
Shows your client's device info as JSON. | - |
sft enroll
|
Adds your new client to your client inventory on the Okta Privileged Access platform. |
|
sft fleet enroll
|
Silently enroll clients multiple clients within a fleet. See Silently enroll the Okta Privileged Access client. |
|
sft help
|
Shows a list of commands or help for one command. | - |
sft list-accounts
|
Lists the accounts that this client is configured to use. |
|
sft list-projects
|
Lists available projects for the team. |
|
sft list-servers
|
Lists the servers available in the current team. |
|
sft list-servers-rjson
|
Lists the servers available in the current team in an RJSON format. You can save this output to a file and used in Royal TSX to create a dynamic folder. See Configure Royal TSX for Advanced Server Access . |
|
sft login
|
If logged out of your client's current team, creates a session, authenticating with your team's Identity Provider.
An active, authorized client session allows the Okta Privileged Accessclient to request credentials in the background as needed. |
|
sft logout
|
Logs out from the current session. |
|
sft proxycommand
|
Used with OpenSSH ProxyCommand to enable transparent use of sft with ssh, scp, rsync, ftp, and so on. |
|
sft rdp
|
Connects through RDP to a target passed as an argument. |
|
sft register-url-handler
|
(Windows only) Opens the ScaleFT application when a user clicks the Connect button on the My Servers page. Running the command will create these folders.
The ScaleFT application can't be launched by the Connect button if the corresponding entry is missing from the Windows Registry. See How the ASA/OPA Webpage Launches SFT for details. |
- |
sft resolve
|
Resolves a single-server matching the specified hostname or instance-details. |
|
sft secrets
|
Lists all available secrets commands. | - |
sft secrets list
|
Lists all top-level secret folders and secrets. |
Note:
You must provide both --path: Uses the specified path. |
sft secrets create
|
Creates a secret. The name can only contain alphanumeric characters (a-Z, 0–9), hyphens (-), underscores (_), and periods (.) |
|
sft secrets create-folder
|
Creates a secret folder. The name can only contain alphanumeric characters (a-Z, 0–9), hyphens (-), underscores (_), and periods (.) |
|
sft secrets describe
|
Shows metadata about the secret at path. |
|
sft secrets describe-folder
|
Shows metadata about the secret folder at path. |
|
sft update-secret
|
Updates a secret's values. Use |
|
sft secrets delete
|
Deletes the specified secret. |
|
sft secrets delete-folder
|
Deletes the specified secret folder. All the contents in that folder is also deleted. |
|
sft secrets reveal
|
Displays the key names and secret value fields. |
|
secrets update-secret-metadata
|
Updates the name or description of a secret. |
|
secrets update-folder-metadata
|
Updates the name or description of a secret folder. |
|
sft session-logs verify
|
Verify the integrity of a specified session log against the Okta Privileged Access gateway signing key registered with Okta Privileged Access. Log files without valid signatures may be inaccurate or corrupted by an attacker. |
--stdin: Returns session data from stdin, instead of from a session log file. |
sft session-logs export
|
Export session logs to a particular format. By default, logs are exported to JSON format. Session logs are also verified during the export process. Log files without valid signatures may be inaccurate or corrupted by an attacker. |
|
sft ssh
|
Connects through Secure Shell to a target passed as an argument.
Generally, Okta Privileged Access works with |
|
sft ssh-config
|
Prints an OpenSSH configuration block suitable for use in your ~/.ssh/config file, which enables your local ssh binary to use Okta Privileged Access authentication. This SSH configuration is used only when your client has a currently active and authorized session. |
|
sft support collect
|
Collect local diagnostic information for Okta Support. | - |
sft support submit
|
Submit diagnostic information for Okta Support. | - |
sft unenroll
|
Removes the currently active client from your client inventory in the Okta Privileged Access platform. |
|
sft use
|
Sets an enrolled team as the current default for use in your current session. |
|
|
(abbreviate as |
Used by a workload to authenticate to Okta Privileged Access using its identity proof (JWT) and retrieve an Okta Privileged Access token. |
|
Selectors
-l, --selector: The selector (label query) to filter on.
Commands that take a selector as an optional argument can filter their results based on an arbitrary selector query.
The selector syntax is based on Kubernetes label queries. See Labels and Selectors.
Example:
sft list-servers -l os_type=windows,project_name=Demo
The example uses a selector to filter the list of servers you have access to. It returns a list of Windows servers that are enrolled in the demo project.
Client configuration
You can view or set configuration options with the sft config command.
No configuration file exists when the Okta Privileged Access client is installed. The configuration file is created when you set your first configuration option.
Default settings are used until you explicitly set a configuration value. The defaults provided for the Okta Privileged Access client are intended to provide the most security and ease of use for the most common situations. Aside from personal preferences, such as the setting for rdp.screensize, you may not need to set any client configurations at all.
Okta Privileged Access client configurations are grouped into sections. Currently these sections include rdp, ssh, ssh_agent, service_auth, and update.
View your configuration
-
sft config: Display your current configurations. -
sft config [section.key]: View the current value of a specific configuration indicated bysection.key
Set a configuration value
You can set a configuration value with the command syntax: sft config [section.key] [value].
RDP configuration options
|
Key |
Description |
Examples |
|---|---|---|
| rdp.screensize | Set this to a string value, such as 1024x768 that describes your preferred RDP window size. |
|
| rdp.fullscreen | Set this to true to have RDP sessions open in fullscreen mode. When set to true, the value of rdp.screensize is ignored. |
|
| rdp.client |
(macOS only) Set this to your preferred RDP client, either royaltsx for Royal TSX, or macfreerdp for MacFreeRDP. If you don't set this option, Okta Privileged Access attempts to use Royal TSX, and then MacFreeRDP if Royal TSX is unavailable. |
|
SSH configuration options
|
Key |
Description |
Examples |
|---|---|---|
| ssh.save_privatekey_passwords | If set to true, the Okta Privileged Access client stores any passphrases entered by the user in the workstation's local cryptographic store. |
|
| ssh.port_forward_method | Set this to netcat to have Okta Privileged Access remotely execute netcat (nc) as a means of port forwarding, rather than using the default native SSH port forwarding. |
|
|
ssh.insecure_forward_agent Note:
This feature isn't compatible with the Windows client. |
Set this to Not setting this option or setting it to the value none causes Okta Privileged Access to not forward the SSH agent. |
|
|
prefer_bundled_ssh |
If set to |
|
SSH agent configuration options
|
Key |
Description |
Examples |
|---|---|---|
| ssh_agent.enable | If set to true, the Okta Privileged Access client uses an SSH agent when a user authenticates. |
|
| ssh_agent.keys |
Set this to a JSON array of one or more paths to SSH private keys to load into the SSH agent. You can append values to this list by using the --append flag.
Tip: When you write a JSON literal in Windows PowerShell, escape inner quotes; for example:
|
|
Network configuration options
|
Key |
Description |
Examples |
|---|---|---|
| network.forward_proxy | If you configure this option, the Okta Privileged Access client uses the specified HTTP or HTTPS URL as an HTTP tunnel. |
sft config network.forward_proxy https://your-proxy.example.com:3141
|
|
network.tls_use_bundled_cas |
If set to Note:
This option is enabled by default. Okta recommends that you don't disable it, as certain operating systems may have issues with CA lists and the performance may be worse than using bundled CA certificate lists. |
|
Miscellaneous configuration options
|
Key |
Description |
Examples |
|---|---|---|
| service_auth.enable |
If set to Note:
This option is only required to be set on Linux clients to use service users. Setting it on Windows may break |
|
| update.release_channel | The Okta Privileged Access client defaults to the stable update channel, but you can opt into receiving more frequent releases by setting this option to use the test update channel. |
|
| client.timeout_seconds |
Defines the maximum time that the client waits for a response from a server before resending the request.
|
sft config client.timeout_seconds 60
sft config client.timeout_seconds -1
|
Environment variables
|
Variable |
Description |
Examples |
|---|---|---|
| SFT_DEBUG | When set, any command run prints internal logs and timing messages to stderr
|
SFT_DEBUG=1 sft list-servers
|
| SFT_ALLOW_INSECURE_USERNAMES | When set, allows connections with usernames that include non-standard characters. |
SFT_ALLOW_INSECURE_USERNAMES=1 sft ssh ...
|
Related topics
Install the Okta Privileged Access client