Enable MFA for the Admin Console
Make MFA mandatory for accessing the Admin Console. If admins haven't enrolled the required authenticators, they're prompted to enroll when they try to access the Admin Console.
Before you begin
Enable at least two authenticators for your org. See Multifactor authentication. Okta recommends enabling at least one phishing-resistant authenticator such as Okta FastPass or FIDO2 (WebAuthn).
Enable MFA in the policy
-
In the Admin Console, go to .
- Open the Okta Admin Console policy, then open the Admin App Policy rule in Edit mode.
- Edit the rule. See Add an authentication policy rule. Configure the following conditions:
- User must authenticate with: Select any of the 2 factor types options.
- Possession factor constraints are: Specify the required characteristics of the possession factor. Okta recommends requiring a phishing-resistant possession factor.
- Prompt for authentication: Select how often Okta should prompt the user for authentication. Okta recommends prompting every time the user signs in to the resource.
- Click Save.
- Repeat these steps to edit the Catch-all rule to require MFA.
Enforce MFA to access the Admin Console
Early Access release. See Enable self-service features.
To enable this feature you must:
-
Verify you have the necessary authenticators for MFA.
-
Ensure that your MFA enrollment policy has enough factors enabled so that admins can satisfy the authentication requirements.
-
Ensure that all admins are enrolled in at least two factors.
This feature makes MFA mandatory for accessing the Admin Console. It automatically updates any authentication policy rules that protect the Admin Console with single-factor to 2-factor. It also requires new rules to be 2-factor.
If you disable this feature, any policies updated to 2-factor aren't reverted to single-factor automatically.
Enforce MFA for Identity Governance admin apps
Early Access release. See Enable self-service features.
If your org uses Okta Identity Governance, you can require MFA for admins who access these first-party apps. This feature is only available when the Enforce MFA to access the Admin Console feature is enabled. To enable the feature in the Admin Console, go to . If this feature isn't available on the Features page, contact Support.
When you enable this feature, the Admin App policy for the Admin Console is applied to the following Identity Governance apps:
- Okta Access Certifications
- Okta Entitlement Management
- Okta Access Requests Admin
If you disable this feature, the changes aren't automatically reverted. You must manually edit the rules to allow single-factor access.