#
Okta Integration with VerifEye
This guide walks you through setting up VerifEye as a generic OpenID Connect (OIDC) provider in Okta, enabling you to use VerifEye's biometric verification as an authentication factor in your Okta-managed applications.
#
Prerequisites
Before configuring Okta, ensure you have:
- Admin access to your Okta organization
- A VerifEye account and API key, and a verification configuration set up for OIDC integration (see below)
- Understanding of the OpenID Connect flow
#
Configuring the VerifEye Verification
To integrate VerifEye with Okta, you need to create a VerifEye verification configuration that will be used as the OIDC provider. Follow these steps:
You can create a new verification configuration in the VerifEye Developer Console under Verification Configurations. Make sure to note the configuration ID and API key, as you will need these for the Okta setup.
#
1. Basic Settings
When creating the verification configuration, set the following basic settings:
#
2. Verifier Configuration
For the OIDC integration, you must configure the verification configuration to include the following settings:
- Face Recognition
- Unique Match Verification: one person can be only registered once in the system, if the same person tries to register again with a different identifier (email address), the verification will fail
- Match Verification: one person can be registered multiple times in the system, if the same person tries to register again with a different identifier (email address), the verification will pass
Additionally you can configure other settings such as liveness detection, age or gender verification.
#
3. Advanced Settings
For the OIDC integration, you must also configure the following advanced settings:
- Include Signature: enabled
- Include Verification Result: enabled
- Include Custom Input Parameters: enabled
- Force Signed Input: enabled
#
Adding VerifEye as Generic OIDC Provider
#
1. Create New Identity Provider
- Navigate to Security > Identity Providers in your Okta Admin Console
- Click Add Identity Provider
- Select Add OpenID Connect IdP
#
2. Configure Provider Settings
Configure the following basic settings:
#
3. Configure the Endpoints
Set the OpenID Connect endpoints depending on your VerifEye region, for example for the EU region:
#
Required Additional Settings
After creating the OIDC provider, you must configure additional authentication settings:
#
1. Set Up an IdP Authenticator
- Create a new authenticator that uses the VerifEye OIDC provider
#
2. Create or Update your App sign-on Policies
- Define your rules for when the VerifEye authentication should be triggered in your authentication policies
#
Additional Resources
For detailed configuration options and advanced settings, refer to the official Okta documentation:
- Okta OpenID Connect Identity Providers
- Configuring IdP Authenticators
- Multifactor authentication
- Authentication method chain
Important
Remember that configuring only the OIDC provider is not sufficient. You must also set up authenticators and authentication policies to ensure proper security and functionality.