Skip to main content

Okta RADIUS integration

Multi-Factor Authentication (MFA) is an extra layer of security used when logging into websites or apps. Individuals are authenticated through more than one required security and validation procedure that only you know or have access to.

Remote Authentication Dial-In User Service (RADIUS) is a protocol commonly used to authenticate, authorize, and account for user access and actions.

Arculix by SecureAuth offers a simple solution for adding multi-factor authentication (MFA) to Okta via its RADIUS solution. This step by step integration instruction illustrates how to configure both Okta and Arculix appliances using RADIUS.

Prerequisites

  • Arculix RADIUS Agent that is configured and connected to your user directory. For example, Microsoft Active Directory (AD).

    For more information, see the Arculix RADIUS Agent deployment guide.

  • User account with administrative privileges for the Okta Dashboard.

Arculix RADIUS Agent configuration

To integrate Arculix with your Okta dashboard, you will need to install an Arculix RADIUS Agent on a machine within your network. This server will receive RADIUS requests from your Okta, check with LDAP server to perform primary authentication, and then contact Arculix cloud service for secondary authentication.

Follow these steps to configure the Arculix RADIUS Agent.

  1. Log in to the Arculix RADIUS Agent as an administrator.

  2. Open the radius-agent-config.env file with an editor.

    The file is located in the installed directory of RADIUS Agent. RADIUS clients are configured in this setting.

    Acceptto RADIUS agent
  3. At the end of the radius-agent-config.env file, set the following configuration for the ARA_CLIENTS attribute:

    Note

    The values should be separated by semicolons (;).

    ARA_CLIENTS = <An optional name for your Okta>; <Internal IP address of your Okta>; <a shared secret>

    For example, set:

    ARA_CLIENTS = Okta;192.168.10.50/32;testing12345
    ARA_CLIENTS configuration
  4. Save the file.

  5. Run the following command to apply the changes:

    docker-compose down && docker-compose up -d

Okta configuration

  1. Log in to your Okta organization URL with an administrative account. Then, go to the Security tab and select Multifactor.

  2. Go to On-Prem MFA > Edit and click Enable ON-Prem MFA.

    okta_enable_mfa.png
  3. In the On-Prem Multifactor Authentication Settings section, set the following configurations then click Add New Agent.

    Provider Name

    Optional. Enter a unique name.

    For example, Arculix MFA,

    Provider username format

    Set to Okta username prefix.

    Hostname

    Enter the hostname or IP address of the Arculix RADIUS Agent

    Authentication port

    Enter the port configured for RADIUS in Arculix RADIUS.

    The default is 1812.

    Shared Secret

    Enter the RADIUS shared key in Arculix RADIUS Agent

    okta_mfa_settings.png
  4. Download the Agent and copy your Instance ID number.

    okta_agent_dl.png
  5. Click Save.

Okta Agent installation

  1. Run the agent you downloaded earlier on a machine that can communicate with Arculix RADIUS Agent through RADIUS protocol. Click Next.

    okta_on_prem_agent.png
  2. Set the Installation Folder.

    okta_install_folder.png
  3. Enter the Instance ID number you got earlier from Okta and click Next.

    okta_instance_id.png
  4. Enter your Okta Organization URL and click Next.

    okta_org_url.png
  5. You will be redirected to your Okta instance and need to sign in with your credentials.

    okta_login.png
  6. Select Allow Access.

Okta Groups and Policy configuration

  1. Log in to your Okta organization URL with an administrative account. Then, go to the Directory tab and select Groups. Add users to the group that that you want to authenticate with Arculix MFA.

    okta_groups.png
  2. Go to Security and Authentication. Then, select the Sign On tab and click Add New Okta Sign-On Policy.

    okta_new_sign_on.png
  3. In the Add Policy section, set the following:

    Policy Name

    Enter a unique name.

    For example, Arculix MFA

    Assign to Groups

    Enter the group containing your MFA users.

    okta_add_policy.png
  4. Click Create Policy and Add Rule.

  5. In the Add Rule section, give the rule a name and set up its criteria based on your requirements.

    okta_policy_settings.png
  6. Click Create Rule.

Test your application integration

  1. Sign in to your Okta organization URL with the credentials needed to pass Arculix MFA authentication.

  2. The Set up multi factor authentication window appears. Select ArculixMFA and continue with the proper credentials.

    okta_set_up_mfa.png

    You will get a push notification on your Arculix Mobile app. Accept it and finish the setup.

    okta_acceptto_mfa.png
  3. At the next login, you will be redirected to the Arculix MFA window as the second factor of authentication. After providing your passcode (your Active Directory password), you’ll receive a push notification on your Arculix Mobile application to authorize access to your Okta dashboard.

    okta_acceptto_login.png
    arculix_mobile_app_010.png

Support

If you have questions or need assistance, contact SecureAuth Support.

Sales

Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.

Disclaimer

All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.

Okta is either registered trademarks or trademarks of Okta, Inc. and/or one or more of its subsidiaries in the United States and/or other countries.

Microsoft and 'Active Directory' are either registered trademarks or trademarks of Microsoft and/or one or more of its subsidiaries in the United States and/or other countries.