- 23 Apr 2025
- 2 Minutes to read
- Print
- DarkLight
- PDF
Configuring Okta for passwordless authentication
- Updated on 23 Apr 2025
- 2 Minutes to read
- Print
- DarkLight
- PDF
This guide provides step-by-step instructions on how to configure Okta to use DIGIPASS FX7 authenticators for multi-factor authentication (MFA) to ensure secure and efficient authentication for your users.
Before you begin
Ensure that you have an Okta account with administrative access.
Ensure that you have DIGIPASS FX7 authenticators ready for configuration.
Configuring passwordless authentication
Configuring Okta to allow authentication with FIDO2 passkeys includes the following steps:
Setting up the FIDO2 (WebAuthn) authenticator in Okta. The FIDO2 (WebAutn) authenticator can be used for authentication when users sign in to Okta.
Creating the required user groups. You can group users to simplify user management and access rights.
Configuring an authenticator enrollment policy. Authenticator enrollment policies specify how and when users can enroll authenticators.
Configuring an authentication policy to use FIDO2. Authentication policies specify the authentication factor requirements when users sig in.
Configuring a global session policy. Global session policies specify the context necessary for users to advance to the next authentication step and the actions to take in that cases.
Step 1: Set up FIDO2 (WebAuthn) authenticator in Okta
Sign in to the Okta Admin Console using your administrator credentials.
Navigate to Security > Authenticators.
Configure the FIDO2 (WebAuthn) authenticator:
Switch to the Setup tab.
Click Actions in the FIDO2 (WebAuthn) row.
Click Edit.
Under Settings, select Required from the User verification list. Now users will always be prompted for user verification when they enroll a new FIDO2 (WebAuth) authenticator.
Click Save.
Step 2: Create required user groups
Sign in to the Okta Admin Console using your administrator credentials.
Navigate to Directory > Groups.
Click Add Group.
Type a name for the new group in the Name box.
Click Save.
Repeat these steps to create all the required groups for new and any existing users according to your needs, e.g., New Employees, Existing Employees, and so on.
Step 3: Configure authenticator enrollment policy
Sign in to the Okta Admin Console using your administrator credentials.
Navigate to Security > Authenticator Enrollment.
Click Add Policy.
Assign the policy to the user groups that you created in the previous steps.
Set the following conditions:
Email: Disabled
Okta Verify: Disabled
Password: Required
FIDO2 (WebAuthn): Required
Click Update Policy.
Step 4: Configure authentication policy for Okta Dashboard
Sign in to the Okta Admin Console using your administrator credentials.
Navigate to Security > Authentication Policies.
Click Okta Dashboard.
In the Rules tab, select Catch-all Rule and click Actions > Edit
Configure the following THEN conditions:
User must authenticate with: Any two factor types
Possession factor constraints are: Phishing resistant, Require user interaction
Authentication methods: Allow specific authentication methods and add the FIDO2 (WebAuthn) method
Click Save.
Move the rule to the top of the priority list.
Switch to the Applications tab, and click Add App.
Add the Okta Dashboard app to the policy.
Search for other apps that you want to assign to these users and add them to the policy.
Step 5: Configure global session policy
Sign in to the Okta Admin Console using your administrator credentials.
Navigate to Security > Global Session Policies.
Click the Pencil icon next to Default Rule.
Edit the global session policy rule with the following conditions:
Establish the user session with: Any factor used to meet the authentication policy requirements
Multifactor authentication (MFA): Required
Users will be prompted for MFA: At every sign-in
Click Update Rule.
Move the policy to the top of the priority list.