Skip to content

Commit e01408e

Browse files
committed
Update Blog “okta-sso-integration-for-green-lake-and-aruba-central”
1 parent 36a9ebb commit e01408e

File tree

1 file changed

+1
-16
lines changed

1 file changed

+1
-16
lines changed

content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Okta SSO integration for Green Lake and Aruba Central
33
date: 2023-02-14T20:11:58.846Z
4-
externalLink: https://blog.wifig-guys.com
4+
externalLink: ""
55
author: "Will Smith - Consulting Systems Engineer (ACEX #34)"
66
authorimage: /img/willsmith-sm.jpg
77
thumbnailimage: /img/gl-sso.jpg
@@ -148,18 +148,3 @@ Enter the SSO credentials and you will be redirected to Okta to authenticate. On
148148
* SSO users can initiate a Single Sign On request by trying to log in to Aruba Central (SP-initiated login).
149149
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
150150

151-
**Okta MFA Example:**
152-
153-
* Okta as well as many cloud identity providers support various MFA and other types of additional security policies.
154-
* Okta Verify (Okta native MFA app) example:
155-
* Okta Admin portal > Security > MFA > Factor Type – Okta Verify Enable
156-
157-
![](/img/ws-image17.png)
158-
159-
1. Click Factor Enrollment and create an enrollment policy.
160-
2. Then select the user groups to apply this policy to.
161-
3. For MFA enable verify with push.
162-
163-
![](/img/ws-image18.png)
164-
165-
![](/img/ws-image19.jpeg)

0 commit comments

Comments
 (0)