Configure Okta Two Factor Authentication Methods

Summary

Guide to setting up Okta two factor authentication.

Body

Service Details

Multifactor authentication (MFA) is an added layer of security used to verify an end user's identity when they sign in to an application. MFA enhances security by making it more difficult for unauthorized users to gain access, even if a password is compromised. After a user enters their username and password, they are prompted to provide an additional factor, such as a code from the Okta Verify app, a hardware token, or a biometric verification. 

FAQ's

 

How do I setup Okta Verify?

Okta Verify is a mobile app that verifies your identity in one of two ways. Okta can send you a push notification that you approve using Okta Verify. Alternatively, Okta Verify can generate a six-digit code that you enter into your Okta login screen to access your required app.

Install Okta Verify

1. Download the Okta Verify app from the Apple App Store or Google Play onto your primary mobile device. 

2. Using your computer’s browser, navigate to your organization’s Okta page, [https://myapps.mccneb.edu]. 

  • Click on your name in the upper-right corner and select Settings
  • Click the Edit Profile button
  • Select Set up beside the Okta Verify option within the Extra Verification box

3. Fill in your MCC issued credentials and click Sign In.

4. When prompted to enroll in Okta Verify, open the Okta Verify app on your phone and scan the barcode that appears in your computer’s browser.

5. The next time you log into Okta, it should offer to send you a push notification or ask you for a numeric code. If you choose the push notification, then approve it when it arrives on your phone. If you choose to use the code, then access the code in Okta Verify and enter it into your browser.

Note: You can only register Okta Verify on one device at a time. Authenticating on a second device cancels authorization for the first one.

Prefer a video walkthrough? 

View Video Overview: Set up Okta Verify with Push for MFA

How do I setup SMS authentication?

SMS Authentication uses the text messaging service on your cell phone to send you a one-time login code. You cannot enter this code by approving a push notification as you can in Okta Verify. Instead, you must type it in by hand. 

Set up SMS authentication

1.Using your browser, navigate to your organization’s Okta page, [https://myapps.mccneb.edu]. 

  • Click on your name in the upper-right corner and select Settings
  • Click the Edit Profile button
  • Select Set up beside the Okta Verify option within the Extra Verification box

2. Fill in your MCC issued credentials and click Sign In. 

3. You will see a prompt on your device that “Extra verification is required for your account” 

4. Click Setup or Configure Factor.

5. On the Setup: SMS screen, type your phone number.

6. Click Send code. Type the SMS code received by your mobile device into the Receive a Code via SMS to Authenticate screen on your computer and click Verify.

Prefer a video walkthrough? 

View Video Overview: Set up SMS for MFA

How do I setup Voice Call Authentication?

This factor calls you via your smartphone or landline and verbalizes an access code aloud. You then type the code into the browser to access your app. This is great for people who don’t have access to a cell phone because it doesn’t require push notifications or text messages.

Set up voice call authentication

1. Using your browser, navigate to your organization’s Okta page, [https://myapps.mccneb.edu]. 

  • Click on your name in the upper-right corner and select Settings
  • Click the Edit Profile button
  • Select Set up beside the Okta Verify option within the Extra Verification box

2. Fill in your MCC issued credentials and click Sign In.

3. You will see a prompt on your device that “Extra verification is required for your account” 

4. Click Setup or Configure Factor.

5. On the Setup: Voice Call Authentication screen, enter your telephone number.

6. Click the Call button.

7. A “Call is in progress…” message appears, followed by a phone call. Enter the provided code into the Enter Code box.

8. Click the Verify button, then Done, if needed.

How do I setup Google Authenticator?

This is a third-party app that generates a six-digit code for you to type into your Okta login screen. You have 30 seconds to input the code before it generates another. If you miss the window, use the next code to log in. After five unsuccessful attempts, Okta will lock your account for protection and you must contact an administrator for help.

Set up Google Authenticator

1. Using your browser, navigate to your organization’s Okta page, [https://myapps.mccneb.edu]. 

  • Click on your name in the upper-right corner and select Settings
  • Click the Edit Profile button
  • Select Set up beside the Okta Verify option within the Extra Verification box

2. Fill in your MCC issued credentials and click Sign In.

3. You will see a prompt on your device that “Extra verification is required for your account”

4. Click Setup or Configure Factor.

5. On the Set-Up Google Authenticator screen, click the device type icon. Click Next. A barcode will appear on your screen.

Install the Google Authenticator app on your device

1. On your mobile device, open the Apple App Store or Google Play and install Google Authenticator.

2. Open the Google Authenticator app.

3. Tap Scan a Barcode. (You might need to install a barcode scanner app; follow the prompts and then re-tap Scan a Barcode.)

4. Hold your device up to the computer screen and scan the barcode.

5. Click Next.

6. Type the Google Authenticator code that appears on your mobile device into the Setup Google Authenticator screen on your computer and click Verify.

Prefer a video walkthrough?

iPhone

View Video Overview: Set up Google Authenticator for MFA 

How do I setup U2F security key (FIDO 1.0)?

Some users prefer to authenticate using a physical security key. Some companies create hardware keys that can authenticate you via your computer’s USB port or via near-field communications (NFC). These comply with the universal second factor (U2F) standard hosted by the FIDO Alliance. 

Okta supports U2F keys including YubiKey and Google’s Titan Security Key. If you already use one of those, then selecting this factor in Okta lets you to stick with the program you already know.

Some browsers feature native U2F support while others need a browser extension to use it.

Authenticate using U2F

1. Using your browser, navigate to your organization’s Okta page, [https://myapps.mccneb.edu]. 

  • Click on your name in the upper-right corner and select Settings
  • Click the Edit Profile button
  • Select Set up beside the Okta Verify option within the Extra Verification box

2. Fill in your MCC issued credentials and click Sign In.

3. You will see a prompt on your device that “Extra verification is required for your account”

4. Click Setup or Configure Factor.

5. Find your security key and follow the prompts to set it up. Click Done.

6. The next time you sign in, you’ll see a panel with instructions for signing in via your security key.

​​​​​​​

Details

Details

Article ID: 2169
Created
Thu 5/22/25 10:10 AM
Modified
Tue 9/16/25 2:58 PM