Active Directory integration prerequisites
This topic provides the prerequisites for Active Directory (AD) integrations.
To install the Okta AD agent, one or more Windows servers are required. These servers are called host servers. These host servers must be on at all times and have a continuous connection to the internet so that they can communicate with Okta.
- The host server can be a physical or virtual server.
- The server should have at least 2 CPUs and a minimum of 8GB RAM.
Download and install the latest version of the Okta AD agent on your host servers to make sure that you have the most current features and functionality and get optimum performance. If you are running multiple Okta AD agents, make sure they are all the same version. Running different versions within a domain can cause all agents in that domain to function at the level of the oldest agent. This does not affect other domains.
- Okta recommends installing Windows server 2012, Windows Server 2016, Windows Server 2019, or Windows server 2022 on the host server — You need access to a Windows server to install the Okta AD agent. You do not need to install the agent on the domain controller. Your system must have 20MB memory for the AD Service Account that is created during the agent installation.
.NET 4.6.2 or later. If you have an earlier version of .NET, upgrade to 4.6.2 or later.
- To improve the security of AD integrations, the default security protocol is TLS1.2 for orgs running .NET Framework 4.5 or later.
- AD domain/forest functional level — Okta supports an AD domain/forest functional level of 2003 and higher. For additional information on AD domain functional levels, see: https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/understanding-active-directory-domain-services--ad-ds--functional-levels
- If you are using the AD domain functional level of 2003, AD usernames must be in the domain name format. That is, users must have a UPN that contains the @domain.name format.
- Member server — The host server can be a member server in your AD domain or a domain controller. Okta recommends that you use a member server.
Run the setup wizard from the host server – Run the agent setup wizard in a web browser on the host server where you want to install the agent. If you do not follow this recommendation, you must transfer the agent installer to the host server and then run it.
- Must be a member server within your active directory forest — The host server can be in a different domain than the domain that your users reside, but it must be in the same AD forest. Placing the agent on a different domain may cause performance issues.
- AD password history policy — To enforce the AD Password History policy, you must use Okta AD agent version 3.4.1 or later and your AD Domain functional level should be Windows Server 2012 R2 or higher.
- High availability — To ensure high availability and redundancy, install the agent on two or more computers.
- Number of agents — If there are 30K or more users, deploy a minimum of 3 AD agents.
You also need to determine:
- the username format to use when importing AD users into Okta (email, samAccountName, UPN, or custom).
- which OUs to import users and groups from.
- which AD attributes to import to the Okta user profile.
- Okta admin account — Used when you install the AD agent to allow the AD agent to connect to Okta. This account should be Okta-sourced, not AD-sourced. Super admin permissions are required for this account type.
- AD user account with Domain Admin permissions — Required to run the Okta AD agent installer. Okta recommends using the same AD service account to install all Okta AD agents. During the installation, you are asked if you want to create the Okta service account.
- Okta service account to run Okta AD Agent service — This is an AD domain service or user account. It can be created by the installer (called OktaService by default) or you can select an existing account. It is important that the Okta service account has permissions in all domains in that forest to read and access user data in all domains to which the agent connects.
For installation, you need an Okta account, not an AD account, to connect the AD agent to Okta. To create this account, you must be a super admin.
Okta recommends that you use a dedicated Okta admin account for the AD agent. If you use an individual's super admin account to install and run the AD agent, and that individual later has their admin privileges lowered, revoked, or deactivated, the Okta AD integration stops working. If this occurs, you need to uninstall the existing AD agent and reinstall the AD agent with a new super admin account to reconnect Okta to AD.
- Sign in to your Okta super admin account.
- Click Admin to open the Okta Admin Console.
- Click .
- Complete the fields and click Save.
- In the Grant Administrator role to field, start entering the name of the user you added in step 3 and select the user from the list.
- Select Super Administrator. For admin permissions information, see Administrators.
Okta recommends that the Okta AD agent admin accounts are Okta-sourced and not AD-sourced. This does not affect existing AD-sourced administrators. It is recommended that you disconnect your admins from AD (select , select the admin users who you want to disconnect, and then click Disconnect Selected).
Okta recommends you use the same AD service account to install all of your agents. During agent installation, you are asked if you want the installer create the Okta service account. You need one of the following based on your choice:
- An AD domain admin account if you want to let the installer create the Okta service account.
- An AD user account that has local administrator privileges on the host server if you want to use an existing domain user account as the Okta service account.
An AD user account needs read access rights to the OU, including the OktaService account, when selecting Use an alternate account that I specify in the Setup.
The Okta service account can be created by the installer. By default it is called OktaService. If you choose to use an existing domain user account, be sure to set the account password to never expire. Managed service accounts are supported by Okta AD agent version 3.6.0 and later.
During installation, you are asked if you want to let the installer create the Okta service account. To do so, you must have the following permissions:
- Be a member of the domain admins group. This is required because you must be able to create a new AD user in AD that will act as the AD agent service account.
- Have local administrator privileges. If you are installing the AD agent but using an existing user account to run as the service account, you only need local administrator privileges.
With either option, the installer grants logon as a service to the domain user you select.
Okta service account permissions
The AD agent runs under the Okta account you specified (either the Oktaservice account the installer creates or the domain user you select during the agent install). Depending on the configuration of your integration, the agent performs the following actions:
- Read users, OUs, and groups — Requires read access on the accessed objects. By default, a domain user has sufficient permission to do this. We recommend read access on the entire domain, but it isn't required.
- Authenticate users — No special permissions are required.
- Change user passwords (by supplying the current password) — No special permissions are required.
- Set user passwords (administratively, without the current password) — Requires permissions to set passwords for users.
- Create and update users, attributes, and memberships in AD with values pushed from Okta — Requires permissions to read and write to the attribute(s) you are updating.
Configure delegation for the Okta Service account
- On your AD Domain controller, open the Active Directory Users and Computers snap-in.
- Right-click the OU or domain name, and then select Delegate Control.
- In the Delegation of Control Wizard. add the Okta service account and select the tasks to delegate:
Create, delete, and manage user accounts — For create and update user flows.
Reset user passwords and force password change at next logon — For syncing passwords.
Read all user information — For import and create user flows.
Modify the membership of a group — For Group Push.