Adaptive Multi-Factor Authentication
Secure access for your entire business because 81% of data breaches involved weak or stolen credentials.
According to 2017 Verizon Data Breach Investigative Report

- Secure
Authentication for employees, partners, and customers accessing apps, systems, and devices
- Simple
Simple for admins to deploy and maintain, without impacting end user productivity
- Intelligent
Create intelligent policies based on login context that limit identity challenges to risky login attempts
Features
Multi-Factor Authentication
Implement a variety of different factors for authentication across usability and assurance levels:
Knowledge factors
Based on something the user knows
Possession factors
Based on something the user has
Biometric factors
Based on something the user is

Okta supports a variety of native and 3rd party factors
Contextual Access Management
Set intelligent access and authentication policies based on login context

Location Context
- New city, state, or country
- New geo-location

Device Context
- Device recognition
- Device management

Network Context
- New IP
- Specified IP zones
- Network anonymizers

Risk Context
Okta ThreatInsight: Create policies based on risk signals seen across Okta’s global dataset, such as high risk IP addresses
Enable a passwordless user experience with ThreatInsight
Use insights gathered from our Okta Integration Network to set risk-based authentication policies. After using ThreatInsight to confidently assess the risk of an authentication event, organizations can enable a passwordless experience for end users.
Enhanced user & admin experience
Adaptive MFA includes features that improve user experience while enhancing the security posture
- Authenticate without a password: Enable user authentication by using other factors in lieu of a password
- Seamless enrollment: Self-service MFA enrollment during initial login
- Flexible authentication: Select from a variety of end user experiences, including 1-click authentication
- Simple reporting and auditing: Detailed authentication logs, such as login attempts, with preset reports for audits and easy integration with security tools
Apps
Secure access to any of the 5,500+ out-of-the-box cloud, on-premise, mobile, and custom apps in the Okta Integration Network.

VPNs
Protect remote access to your network through VPN integrations including Palo Alto Networks GlobalProtect, Cisco AnyConnect, and Fortinet FortiGate.

Desktop Virtualization
Enable strong authentication to VDIs such as Citrix Xen Desktop or VMware Horizon View.

Device Management
Set and enforce authentication policies based on device management status from VMWare, MobileIron, Intune, or JAMF.

Identity Providers
Integrate Okta MFA with 3rd party IdPs such as ADFS.

Security Analytics
Enrich security analytics with identity and authentication data for greater visibility and enhanced incident response.

Cloud Access Security Brokers
Secure access and enforce authentication policies when CASB detects anomalous behavior.

Feature |
MFA |
AMFA |
|---|---|---|
| Factors | ||
| Knowledge Factors | ||
| Possession factors | ||
| Biometric factors | ||
| Contextual Access Management | ||
| Location context | ||
| Device context | ||
| Network context | ||
| Integrations | ||
| Enhanced admin & end user experience |
Free Trial
Ready to try it out? Try Okta Adaptive MFA for free for 30 days or contact us for more information.
News and resources
5 Identity Attacks That Exploit Your Broken Authentication
As organizations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter expands to wherever the user is logging in from.
Read blog postFlex Builds an Intelligent, Connected World. Okta Provides a Secure Foundation.
With innovation labs and smart factories, Flex leads the movement towards the Intelligence of Things by designing, building and manufacturing smart, connected devices at global scale.
Read case studyAdaptive MFA Datasheet
Okta Adaptive Multi-Factor Authentication (MFA) provides the additional security to protect organizations from data breaches while offering administrators and end users the simplicity to stay productive.
Download datasheet
