Okta
Authentication for Okta using Beyond Identity
Integrate Beyond Identity with your Okta organization for users to have phishing-resistant and passwordless authentication.
This guide covers the process of configuring Okta and Beyond Identity. Each section contains instructions for that specific platform. View the overall summary in the list below.
- Set up new configurations on each console for Beyond Identity and Okta
- Set up Okta SCIM user provisioning
- Add new users to Beyond Identity for passkey verification
- Configure rules to use Beyond Identity in Okta
Prerequisites
To get started with the integration, view the following prerequisites.
Okta requirements
This information contains the necessary items for integrating with Beyond Identity.
- Okta account access with Organizational Admin or Super Admin privileges
- Available features of OpenID Connect IdP and routing rules*
- *If these features are missing from your organization, contact Okta support for activation.
Beyond Identity requirements
The list below covers the basic Beyond Identity requirements for the integration.
- Secure Access Tenant with Super Admin Role
- Use an existing account, or sign up here to create a new Beyond Identity account
- Have at least two devices and two Super Admin roles configured*
- *Recommended, optional
Steps
Follow the steps in the sections below to complete your integration for Beyond Identity and Okta.
Legend
The sections below use these two color codings to identify the steps for separate platforms.
🔵 Beyond Identity - Beyond Identity platform tasks are highlighted in blue.
🟠 Okta - Okta platform tasks are highlighted in orange.
🔵 Set up Beyond Identity console
The following section covers the 🔵 Beyond Identity console and related steps.
- Navigate to your Beyond Identity console.
- On the left-hand navigation under Access Control, click Applications.
- Select the Browse Applications tab.
- Click Okta to proceed.
- Under General → Display Name, input
New SSO Application
into the text field. - For the Okta Token value, paste the API token value from your Okta organization.
- Scroll down to the Important Values section.
🟠 Configure Okta with added identity provider
The steps in this section are for setting up Beyond Identity in 🟠 Okta as a new identity provider for users to log in.
- Navigate to your Okta organization account.
- Under Security on the left dropdown navigation, click Identity Providers.
- Click Add identity provider.
- Click Next.
- Under General Settings, type
Beyond Identity
into the Name field. - Copy the following values from Step 7 of the 🔵 Set up Beyond Identity console section. Paste the following values into the corresponding fields.
- 🔵 Issuer → 🟠 Issuer, under Endpoints
- 🔵 Authorization endpoint → 🟠 Authorization endpoint, under Endpoints
- 🔵 Token Endpoint → 🟠 Token endpoint, under Endpoints
- 🔵 User Info Endpoint → 🟠 Userinfo endpoint, under Endpoints
- 🔵 Client ID → 🟠 Client ID, under Client details
- 🔵 Client Secret → 🟠 Client Secret, under Client details
- Click Finish.
🟠 Set up Okta directory integration
This section is a walkthrough for setting up the Okta directory as the upstream source to share user identity information to Beyond Identity. View the use cases below.
- SCIM user provisioning - Okta user identity information programmatically syncs to Beyond Identity
- Registration syncing - Okta redirects users to Beyond Identity
- NOTE: This feature sets up the passwordless experience for users Okta users. It omits the username and password input screen because it redirects to Beyond Identity.
🟠 Create Beyond Identity group
You can specify users to authenticate with Beyond Identity and without passwords. This section covers creating a group in Okta for including this configuration for users. View the clip below for instructions.
🟠 Generate API token in Okta
Beyond Identity requires an Okta API token to communicate updates to Okta. This includes notifying Okta when users bind passkeys to their device. This action is required for users to be routed to Beyond Identity from Okta. The clip below covers the steps to generate the token.
🔵 Configure the directory in Beyond Identity
The sections below go over adding a new user to your Beyond Identity identities directory.
🔵 Manual entry
- Under Directory, click Identities.
- Click Add identity.
- Click Manual entry.
- Add the details for the new identity.
- Click Add identity. Return to the identities page.
- Click the recently added identity to go to that profile page.
- Select the Passkeys tab.
- Click Add a passkey.
- Click Magic Link. NOTE: For IDP Authorization, contact your Beyond Identity representative.
- For delivery method, select your preferred option.
- Send email - Prompts verification through link sent to the identity's email address
- Generate link - Creates a specific link to share for verification
- At this point, the end users completes verification through Beyond Identity Platform Authenticator.
🔵 SCIM implementation
The Okta SCIM implementation requires a bearer token. Use the Okta platform to complete the SCIM to map users and attributes to Beyond Identity for the integration. Complete the sections in the Generic SCIM guide for configuring users from the Okta upstream directory source.
🟠 Complete Okta SCIM configuration
Configure the SCIM application in Okta with the SCIM URL and bearer token generated on the Beyond Identity application page. After completing the provisioning configuration, enable the actions below. The clip below contains the instructions for this process.
- Create Users
- Deactivate Users
Synchronize users with SCIM
Push the created Beyond Identity group from Okta to Beyond Identity. After this is complete, all users in this group appear on the Identities page under Directory.
🟠 Use Okta Routing rules
This section covers steps to configure 🟠 Okta to use Beyond Identity as the identity provider for specific users.
- Under Security, click Identity Providers.
- Click Routing rules tab.
- Click Add Routing Rule.
- Under Rule Name, input the description in the text field.
- Configure User IP, device platform, accessing, and matching sections as needed.
- Under the Use this identity provider section, remove Okta.
- In the field from the previous step, type or select Beyond Identity.
- Click Create rule.
Congratulations! Your end user can now login using Beyond Identity and authenticate with their device!