You can manage authorization and access to applications and resources using
Okta MFA with Push, TOTP, and Yubikey factors using API-based integration. This example
describes how to manually configure a Zero Trust Identity Aware Proxy using Okta MFA
integrated in APM through Okta Factors API. You need to perform some administrative
tasks in Okta and configure an application on the Okta administration dashboard for both
identity and MFA access.
On APM, an Okta Connector defines Okta API parameters for the domain and API
token. The Okta Connector also uses an HTTP Connector Transport for SSL and DNS
settings. Then, you implement second factor authentication in an APM per-request policy
by adding an Okta MFA agent to a subroutine. The agent specifies the place in the policy
to trigger the MFA prompt and references the Okta Connector.