2017-08-09 00:20:37 +00:00
---
2020-01-18 00:18:09 +00:00
layout: api
page_title: /sys/mfa/method/okta - HTTP API
sidebar_title: <code>/sys/mfa/method/okta</code>
description: >-
The '/sys/mfa/method/okta' endpoint focuses on managing Okta MFA behaviors in
Vault Enterprise.
2017-08-09 00:20:37 +00:00
---
## Configure Okta MFA Method
This endpoint defines a MFA method of type Okta.
2020-01-18 00:18:09 +00:00
| Method | Path |
| :----- | :--------------------------- |
| `POST` | `/sys/mfa/method/okta/:name` |
2017-08-09 00:20:37 +00:00
### Parameters
- `name` `(string: <required>)` – Name of the MFA method.
2017-11-03 15:17:59 +00:00
- `mount_accessor` `(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
2017-08-09 00:20:37 +00:00
2017-11-03 15:17:59 +00:00
- `username_format` `(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
2020-01-18 00:18:09 +00:00
2017-11-03 15:17:59 +00:00
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
2017-09-15 04:27:45 +00:00
- entity.name: The name configured for the Entity
2017-11-03 15:17:59 +00:00
- alias.metadata.`<key>`: The value of the Alias's metadata parameter
2018-03-20 18:54:10 +00:00
- entity.metadata.`<key>`: The value of the Entity's metadata parameter
2017-08-09 00:20:37 +00:00
- `org_name` `(string)` - Name of the organization to be used in the Okta API.
- `api_token` `(string)` - Okta API key.
2020-01-18 00:18:09 +00:00
- `base_url` `(string)` - If set, will be used as the base domain for API requests. Examples are okta.com, oktapreview.com, and okta-emea.com.
2017-08-09 00:20:37 +00:00
2020-01-18 00:18:09 +00:00
- `primary_email` `(bool: false)` - If set, the username will only match the primary email for the account.
2018-03-02 16:54:21 +00:00
2017-08-09 00:20:37 +00:00
### Sample Payload
```json
{
"mount_accessor": "auth_userpass_1793464a",
"org_name": "dev-262778",
"api_token": "0081u7KrReNkzmABZJAP2oDyIXccveqx9vIOEyCZDC"
}
```
### Sample Request
```
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
2017-08-09 00:20:37 +00:00
```
## Read Okta MFA Method
This endpoint queries the MFA configuration of Okta type for a given method
name.
2020-01-18 00:18:09 +00:00
| Method | Path |
| :----- | :--------------------------- |
| `GET` | `/sys/mfa/method/okta/:name` |
2017-08-09 00:20:37 +00:00
### Parameters
- `name` `(string: <required>)` – Name of the MFA method.
### Sample Request
```
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
2017-08-09 00:20:37 +00:00
```
### Sample Response
```json
{
2020-01-18 00:18:09 +00:00
"data": {
"api_token": "0081u7KrReNkzmABZJAP2oDyIXccveqx9vIOEyCZDC",
"id": "e39f08a1-a42d-143d-5b87-15c61d89c15a",
"mount_accessor": "auth_userpass_1793464a",
"name": "my_okta",
"org_name": "dev-262778",
"production": true,
"type": "okta",
"username_format": ""
}
2017-08-09 00:20:37 +00:00
}
```
2020-01-18 00:18:09 +00:00
2017-08-09 00:20:37 +00:00
## Delete Okta MFA Method
This endpoint deletes a Okta MFA method.
2020-01-18 00:18:09 +00:00
| Method | Path |
| :------- | :--------------------------- |
| `DELETE` | `/sys/mfa/method/okta/:name` |
2017-08-09 00:20:37 +00:00
### Parameters
- `name` `(string: <required>)` - Name of the MFA method.
### Sample Request
```
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
2017-08-09 00:20:37 +00:00
```