Install and configure Microsoft ADFS in Okta
This topic describes how to install and configure the Okta Multifactor Authentication (MFA) provider for Active Directory Federation Services (ADFS).
Okta orgs that aren't configured to support OpenID Connect and single sign-on can install and configure Microsoft ADFS, but they must use MFA as a service.
Add authenticators
-
In the Admin Console, go to .
- Click Add authenticator.
- Click Add on the authenticator that you want to add. At a minimum, add Okta Verify.
- Configure the authenticator, and then click Add.
- In the Actions menu, choose Edit to configure more settings.
Define groups that authenticate with the Microsoft ADFS (MFA) app
-
In the Admin Console, go to .
- Click Add Group.
- Complete the fields and then click Save.
- Add people to the group. See User management.
Add the Microsoft ADFS (MFA) app
- Sign in to your Okta org as an admin.
-
In the Admin Console, go to .
- Click Browse App Catalog.
- Search for and select Microsoft ADFS (MFA), and then click Add Integration.
- Enter a unique app label.
- Click Next.
-
For Okta orgs that are enabled for OIDC and SSO, do these steps:
- On the Sign-On Options page, select OpenID Connect. Enter an appropriate Redirect URI, and then click Done. Ensure that the redirect URI ends with a forward slash.
For Okta orgs that aren't enabled for OIDC and SSO, do these steps:
- Go to the Sign On tab and select MFA as a service.
- Go to the General tab and note the values of the Client ID and Client secret. These values are required during the Install the Okta ADFS Plugin on your ADFS Server task.
- Follow the steps in Configure MFA for Active Directory Federation Services (ADFS). Configure the useOIDC property as false and then restart the agent.
Enable Cross-Origin Resource Sharing (CORS)
See CORS Overview.
-
In the Admin Console, go to .
- Select the Trusted Origins tab, and then click CORS.
- Click Add Origin.
- Enter the following information:
- Origin name: Enter a name for this origin.
- Origin URL: Enter the origin URL. This can be your ADFS service name.
- Cross-Origin Resource Sharing (CORS): Enable the origin URL to access Okta APIs from JavaScript.
- Redirect: Allow the browser to redirect to the origin URL after signing in or out.
- iFrame embed: Allow Okta sign-in pages and SSO URLs to be embedded in iFrames.
- Allows iFrame embedding of Okta End User Dashboard: Select this option to allow the End-User Dashboard to be embedded in iFrames.
- Click Save.