1. Packages
  2. Okta Provider
  3. API Docs
  4. policy
  5. Mfa
Okta v4.17.0 published on Wednesday, Apr 23, 2025 by Pulumi

okta.policy.Mfa

Explore with Pulumi AI

Example Usage

Create Mfa Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new Mfa(name: string, args?: MfaArgs, opts?: CustomResourceOptions);
@overload
def Mfa(resource_name: str,
        args: Optional[MfaArgs] = None,
        opts: Optional[ResourceOptions] = None)

@overload
def Mfa(resource_name: str,
        opts: Optional[ResourceOptions] = None,
        description: Optional[str] = None,
        duo: Optional[Mapping[str, str]] = None,
        external_idp: Optional[Mapping[str, str]] = None,
        external_idps: Optional[Sequence[Mapping[str, str]]] = None,
        fido_u2f: Optional[Mapping[str, str]] = None,
        fido_webauthn: Optional[Mapping[str, str]] = None,
        google_otp: Optional[Mapping[str, str]] = None,
        groups_includeds: Optional[Sequence[str]] = None,
        hotp: Optional[Mapping[str, str]] = None,
        is_oie: Optional[bool] = None,
        name: Optional[str] = None,
        okta_call: Optional[Mapping[str, str]] = None,
        okta_email: Optional[Mapping[str, str]] = None,
        okta_otp: Optional[Mapping[str, str]] = None,
        okta_password: Optional[Mapping[str, str]] = None,
        okta_push: Optional[Mapping[str, str]] = None,
        okta_question: Optional[Mapping[str, str]] = None,
        okta_sms: Optional[Mapping[str, str]] = None,
        okta_verify: Optional[Mapping[str, str]] = None,
        onprem_mfa: Optional[Mapping[str, str]] = None,
        phone_number: Optional[Mapping[str, str]] = None,
        priority: Optional[int] = None,
        rsa_token: Optional[Mapping[str, str]] = None,
        security_question: Optional[Mapping[str, str]] = None,
        status: Optional[str] = None,
        symantec_vip: Optional[Mapping[str, str]] = None,
        webauthn: Optional[Mapping[str, str]] = None,
        yubikey_token: Optional[Mapping[str, str]] = None)
func NewMfa(ctx *Context, name string, args *MfaArgs, opts ...ResourceOption) (*Mfa, error)
public Mfa(string name, MfaArgs? args = null, CustomResourceOptions? opts = null)
public Mfa(String name, MfaArgs args)
public Mfa(String name, MfaArgs args, CustomResourceOptions options)
type: okta:policy:Mfa
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args MfaArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args MfaArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args MfaArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args MfaArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. MfaArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var mfaResource = new Okta.Policy.Mfa("mfaResource", new()
{
    Description = "string",
    Duo = 
    {
        { "string", "string" },
    },
    ExternalIdps = new[]
    {
        
        {
            { "string", "string" },
        },
    },
    FidoU2f = 
    {
        { "string", "string" },
    },
    FidoWebauthn = 
    {
        { "string", "string" },
    },
    GoogleOtp = 
    {
        { "string", "string" },
    },
    GroupsIncludeds = new[]
    {
        "string",
    },
    Hotp = 
    {
        { "string", "string" },
    },
    IsOie = false,
    Name = "string",
    OktaCall = 
    {
        { "string", "string" },
    },
    OktaEmail = 
    {
        { "string", "string" },
    },
    OktaOtp = 
    {
        { "string", "string" },
    },
    OktaPassword = 
    {
        { "string", "string" },
    },
    OktaPush = 
    {
        { "string", "string" },
    },
    OktaQuestion = 
    {
        { "string", "string" },
    },
    OktaSms = 
    {
        { "string", "string" },
    },
    OktaVerify = 
    {
        { "string", "string" },
    },
    OnpremMfa = 
    {
        { "string", "string" },
    },
    PhoneNumber = 
    {
        { "string", "string" },
    },
    Priority = 0,
    RsaToken = 
    {
        { "string", "string" },
    },
    SecurityQuestion = 
    {
        { "string", "string" },
    },
    Status = "string",
    SymantecVip = 
    {
        { "string", "string" },
    },
    Webauthn = 
    {
        { "string", "string" },
    },
    YubikeyToken = 
    {
        { "string", "string" },
    },
});
Copy
example, err := policy.NewMfa(ctx, "mfaResource", &policy.MfaArgs{
	Description: pulumi.String("string"),
	Duo: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	ExternalIdps: pulumi.StringMapArray{
		pulumi.StringMap{
			"string": pulumi.String("string"),
		},
	},
	FidoU2f: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	FidoWebauthn: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	GoogleOtp: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	GroupsIncludeds: pulumi.StringArray{
		pulumi.String("string"),
	},
	Hotp: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	IsOie: pulumi.Bool(false),
	Name:  pulumi.String("string"),
	OktaCall: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OktaEmail: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OktaOtp: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OktaPassword: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OktaPush: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OktaQuestion: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OktaSms: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OktaVerify: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	OnpremMfa: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	PhoneNumber: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	Priority: pulumi.Int(0),
	RsaToken: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	SecurityQuestion: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	Status: pulumi.String("string"),
	SymantecVip: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	Webauthn: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	YubikeyToken: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
})
Copy
var mfaResource = new Mfa("mfaResource", MfaArgs.builder()
    .description("string")
    .duo(Map.of("string", "string"))
    .externalIdps(Map.of("string", "string"))
    .fidoU2f(Map.of("string", "string"))
    .fidoWebauthn(Map.of("string", "string"))
    .googleOtp(Map.of("string", "string"))
    .groupsIncludeds("string")
    .hotp(Map.of("string", "string"))
    .isOie(false)
    .name("string")
    .oktaCall(Map.of("string", "string"))
    .oktaEmail(Map.of("string", "string"))
    .oktaOtp(Map.of("string", "string"))
    .oktaPassword(Map.of("string", "string"))
    .oktaPush(Map.of("string", "string"))
    .oktaQuestion(Map.of("string", "string"))
    .oktaSms(Map.of("string", "string"))
    .oktaVerify(Map.of("string", "string"))
    .onpremMfa(Map.of("string", "string"))
    .phoneNumber(Map.of("string", "string"))
    .priority(0)
    .rsaToken(Map.of("string", "string"))
    .securityQuestion(Map.of("string", "string"))
    .status("string")
    .symantecVip(Map.of("string", "string"))
    .webauthn(Map.of("string", "string"))
    .yubikeyToken(Map.of("string", "string"))
    .build());
Copy
mfa_resource = okta.policy.Mfa("mfaResource",
    description="string",
    duo={
        "string": "string",
    },
    external_idps=[{
        "string": "string",
    }],
    fido_u2f={
        "string": "string",
    },
    fido_webauthn={
        "string": "string",
    },
    google_otp={
        "string": "string",
    },
    groups_includeds=["string"],
    hotp={
        "string": "string",
    },
    is_oie=False,
    name="string",
    okta_call={
        "string": "string",
    },
    okta_email={
        "string": "string",
    },
    okta_otp={
        "string": "string",
    },
    okta_password={
        "string": "string",
    },
    okta_push={
        "string": "string",
    },
    okta_question={
        "string": "string",
    },
    okta_sms={
        "string": "string",
    },
    okta_verify={
        "string": "string",
    },
    onprem_mfa={
        "string": "string",
    },
    phone_number={
        "string": "string",
    },
    priority=0,
    rsa_token={
        "string": "string",
    },
    security_question={
        "string": "string",
    },
    status="string",
    symantec_vip={
        "string": "string",
    },
    webauthn={
        "string": "string",
    },
    yubikey_token={
        "string": "string",
    })
Copy
const mfaResource = new okta.policy.Mfa("mfaResource", {
    description: "string",
    duo: {
        string: "string",
    },
    externalIdps: [{
        string: "string",
    }],
    fidoU2f: {
        string: "string",
    },
    fidoWebauthn: {
        string: "string",
    },
    googleOtp: {
        string: "string",
    },
    groupsIncludeds: ["string"],
    hotp: {
        string: "string",
    },
    isOie: false,
    name: "string",
    oktaCall: {
        string: "string",
    },
    oktaEmail: {
        string: "string",
    },
    oktaOtp: {
        string: "string",
    },
    oktaPassword: {
        string: "string",
    },
    oktaPush: {
        string: "string",
    },
    oktaQuestion: {
        string: "string",
    },
    oktaSms: {
        string: "string",
    },
    oktaVerify: {
        string: "string",
    },
    onpremMfa: {
        string: "string",
    },
    phoneNumber: {
        string: "string",
    },
    priority: 0,
    rsaToken: {
        string: "string",
    },
    securityQuestion: {
        string: "string",
    },
    status: "string",
    symantecVip: {
        string: "string",
    },
    webauthn: {
        string: "string",
    },
    yubikeyToken: {
        string: "string",
    },
});
Copy
type: okta:policy:Mfa
properties:
    description: string
    duo:
        string: string
    externalIdps:
        - string: string
    fidoU2f:
        string: string
    fidoWebauthn:
        string: string
    googleOtp:
        string: string
    groupsIncludeds:
        - string
    hotp:
        string: string
    isOie: false
    name: string
    oktaCall:
        string: string
    oktaEmail:
        string: string
    oktaOtp:
        string: string
    oktaPassword:
        string: string
    oktaPush:
        string: string
    oktaQuestion:
        string: string
    oktaSms:
        string: string
    oktaVerify:
        string: string
    onpremMfa:
        string: string
    phoneNumber:
        string: string
    priority: 0
    rsaToken:
        string: string
    securityQuestion:
        string: string
    status: string
    symantecVip:
        string: string
    webauthn:
        string: string
    yubikeyToken:
        string: string
Copy

Mfa Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The Mfa resource accepts the following input properties:

Description string
Policy Description
Duo Dictionary<string, string>
ExternalIdp Dictionary<string, string>

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

ExternalIdps List<ImmutableDictionary<string, string>>
FidoU2f Dictionary<string, string>
FidoWebauthn Dictionary<string, string>
GoogleOtp Dictionary<string, string>
GroupsIncludeds List<string>
List of Group IDs to Include
Hotp Dictionary<string, string>
IsOie bool
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
Name string
Policy Name
OktaCall Dictionary<string, string>
OktaEmail Dictionary<string, string>
OktaOtp Dictionary<string, string>
OktaPassword Dictionary<string, string>
OktaPush Dictionary<string, string>
OktaQuestion Dictionary<string, string>
OktaSms Dictionary<string, string>
OktaVerify Dictionary<string, string>
OnpremMfa Dictionary<string, string>
PhoneNumber Dictionary<string, string>
Priority int
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
RsaToken Dictionary<string, string>
SecurityQuestion Dictionary<string, string>
Status string
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
SymantecVip Dictionary<string, string>
Webauthn Dictionary<string, string>
YubikeyToken Dictionary<string, string>
Description string
Policy Description
Duo map[string]string
ExternalIdp map[string]string

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

ExternalIdps []map[string]string
FidoU2f map[string]string
FidoWebauthn map[string]string
GoogleOtp map[string]string
GroupsIncludeds []string
List of Group IDs to Include
Hotp map[string]string
IsOie bool
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
Name string
Policy Name
OktaCall map[string]string
OktaEmail map[string]string
OktaOtp map[string]string
OktaPassword map[string]string
OktaPush map[string]string
OktaQuestion map[string]string
OktaSms map[string]string
OktaVerify map[string]string
OnpremMfa map[string]string
PhoneNumber map[string]string
Priority int
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
RsaToken map[string]string
SecurityQuestion map[string]string
Status string
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
SymantecVip map[string]string
Webauthn map[string]string
YubikeyToken map[string]string
description String
Policy Description
duo Map<String,String>
externalIdp Map<String,String>

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

externalIdps List<Map<String,String>>
fidoU2f Map<String,String>
fidoWebauthn Map<String,String>
googleOtp Map<String,String>
groupsIncludeds List<String>
List of Group IDs to Include
hotp Map<String,String>
isOie Boolean
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name String
Policy Name
oktaCall Map<String,String>
oktaEmail Map<String,String>
oktaOtp Map<String,String>
oktaPassword Map<String,String>
oktaPush Map<String,String>
oktaQuestion Map<String,String>
oktaSms Map<String,String>
oktaVerify Map<String,String>
onpremMfa Map<String,String>
phoneNumber Map<String,String>
priority Integer
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsaToken Map<String,String>
securityQuestion Map<String,String>
status String
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantecVip Map<String,String>
webauthn Map<String,String>
yubikeyToken Map<String,String>
description string
Policy Description
duo {[key: string]: string}
externalIdp {[key: string]: string}

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

externalIdps {[key: string]: string}[]
fidoU2f {[key: string]: string}
fidoWebauthn {[key: string]: string}
googleOtp {[key: string]: string}
groupsIncludeds string[]
List of Group IDs to Include
hotp {[key: string]: string}
isOie boolean
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name string
Policy Name
oktaCall {[key: string]: string}
oktaEmail {[key: string]: string}
oktaOtp {[key: string]: string}
oktaPassword {[key: string]: string}
oktaPush {[key: string]: string}
oktaQuestion {[key: string]: string}
oktaSms {[key: string]: string}
oktaVerify {[key: string]: string}
onpremMfa {[key: string]: string}
phoneNumber {[key: string]: string}
priority number
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsaToken {[key: string]: string}
securityQuestion {[key: string]: string}
status string
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantecVip {[key: string]: string}
webauthn {[key: string]: string}
yubikeyToken {[key: string]: string}
description str
Policy Description
duo Mapping[str, str]
external_idp Mapping[str, str]

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

external_idps Sequence[Mapping[str, str]]
fido_u2f Mapping[str, str]
fido_webauthn Mapping[str, str]
google_otp Mapping[str, str]
groups_includeds Sequence[str]
List of Group IDs to Include
hotp Mapping[str, str]
is_oie bool
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name str
Policy Name
okta_call Mapping[str, str]
okta_email Mapping[str, str]
okta_otp Mapping[str, str]
okta_password Mapping[str, str]
okta_push Mapping[str, str]
okta_question Mapping[str, str]
okta_sms Mapping[str, str]
okta_verify Mapping[str, str]
onprem_mfa Mapping[str, str]
phone_number Mapping[str, str]
priority int
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsa_token Mapping[str, str]
security_question Mapping[str, str]
status str
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantec_vip Mapping[str, str]
webauthn Mapping[str, str]
yubikey_token Mapping[str, str]
description String
Policy Description
duo Map<String>
externalIdp Map<String>

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

externalIdps List<Map<String>>
fidoU2f Map<String>
fidoWebauthn Map<String>
googleOtp Map<String>
groupsIncludeds List<String>
List of Group IDs to Include
hotp Map<String>
isOie Boolean
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name String
Policy Name
oktaCall Map<String>
oktaEmail Map<String>
oktaOtp Map<String>
oktaPassword Map<String>
oktaPush Map<String>
oktaQuestion Map<String>
oktaSms Map<String>
oktaVerify Map<String>
onpremMfa Map<String>
phoneNumber Map<String>
priority Number
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsaToken Map<String>
securityQuestion Map<String>
status String
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantecVip Map<String>
webauthn Map<String>
yubikeyToken Map<String>

Outputs

All input properties are implicitly available as output properties. Additionally, the Mfa resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing Mfa Resource

Get an existing Mfa resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: MfaState, opts?: CustomResourceOptions): Mfa
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        description: Optional[str] = None,
        duo: Optional[Mapping[str, str]] = None,
        external_idp: Optional[Mapping[str, str]] = None,
        external_idps: Optional[Sequence[Mapping[str, str]]] = None,
        fido_u2f: Optional[Mapping[str, str]] = None,
        fido_webauthn: Optional[Mapping[str, str]] = None,
        google_otp: Optional[Mapping[str, str]] = None,
        groups_includeds: Optional[Sequence[str]] = None,
        hotp: Optional[Mapping[str, str]] = None,
        is_oie: Optional[bool] = None,
        name: Optional[str] = None,
        okta_call: Optional[Mapping[str, str]] = None,
        okta_email: Optional[Mapping[str, str]] = None,
        okta_otp: Optional[Mapping[str, str]] = None,
        okta_password: Optional[Mapping[str, str]] = None,
        okta_push: Optional[Mapping[str, str]] = None,
        okta_question: Optional[Mapping[str, str]] = None,
        okta_sms: Optional[Mapping[str, str]] = None,
        okta_verify: Optional[Mapping[str, str]] = None,
        onprem_mfa: Optional[Mapping[str, str]] = None,
        phone_number: Optional[Mapping[str, str]] = None,
        priority: Optional[int] = None,
        rsa_token: Optional[Mapping[str, str]] = None,
        security_question: Optional[Mapping[str, str]] = None,
        status: Optional[str] = None,
        symantec_vip: Optional[Mapping[str, str]] = None,
        webauthn: Optional[Mapping[str, str]] = None,
        yubikey_token: Optional[Mapping[str, str]] = None) -> Mfa
func GetMfa(ctx *Context, name string, id IDInput, state *MfaState, opts ...ResourceOption) (*Mfa, error)
public static Mfa Get(string name, Input<string> id, MfaState? state, CustomResourceOptions? opts = null)
public static Mfa get(String name, Output<String> id, MfaState state, CustomResourceOptions options)
resources:  _:    type: okta:policy:Mfa    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
Description string
Policy Description
Duo Dictionary<string, string>
ExternalIdp Dictionary<string, string>

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

ExternalIdps List<ImmutableDictionary<string, string>>
FidoU2f Dictionary<string, string>
FidoWebauthn Dictionary<string, string>
GoogleOtp Dictionary<string, string>
GroupsIncludeds List<string>
List of Group IDs to Include
Hotp Dictionary<string, string>
IsOie bool
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
Name string
Policy Name
OktaCall Dictionary<string, string>
OktaEmail Dictionary<string, string>
OktaOtp Dictionary<string, string>
OktaPassword Dictionary<string, string>
OktaPush Dictionary<string, string>
OktaQuestion Dictionary<string, string>
OktaSms Dictionary<string, string>
OktaVerify Dictionary<string, string>
OnpremMfa Dictionary<string, string>
PhoneNumber Dictionary<string, string>
Priority int
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
RsaToken Dictionary<string, string>
SecurityQuestion Dictionary<string, string>
Status string
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
SymantecVip Dictionary<string, string>
Webauthn Dictionary<string, string>
YubikeyToken Dictionary<string, string>
Description string
Policy Description
Duo map[string]string
ExternalIdp map[string]string

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

ExternalIdps []map[string]string
FidoU2f map[string]string
FidoWebauthn map[string]string
GoogleOtp map[string]string
GroupsIncludeds []string
List of Group IDs to Include
Hotp map[string]string
IsOie bool
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
Name string
Policy Name
OktaCall map[string]string
OktaEmail map[string]string
OktaOtp map[string]string
OktaPassword map[string]string
OktaPush map[string]string
OktaQuestion map[string]string
OktaSms map[string]string
OktaVerify map[string]string
OnpremMfa map[string]string
PhoneNumber map[string]string
Priority int
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
RsaToken map[string]string
SecurityQuestion map[string]string
Status string
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
SymantecVip map[string]string
Webauthn map[string]string
YubikeyToken map[string]string
description String
Policy Description
duo Map<String,String>
externalIdp Map<String,String>

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

externalIdps List<Map<String,String>>
fidoU2f Map<String,String>
fidoWebauthn Map<String,String>
googleOtp Map<String,String>
groupsIncludeds List<String>
List of Group IDs to Include
hotp Map<String,String>
isOie Boolean
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name String
Policy Name
oktaCall Map<String,String>
oktaEmail Map<String,String>
oktaOtp Map<String,String>
oktaPassword Map<String,String>
oktaPush Map<String,String>
oktaQuestion Map<String,String>
oktaSms Map<String,String>
oktaVerify Map<String,String>
onpremMfa Map<String,String>
phoneNumber Map<String,String>
priority Integer
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsaToken Map<String,String>
securityQuestion Map<String,String>
status String
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantecVip Map<String,String>
webauthn Map<String,String>
yubikeyToken Map<String,String>
description string
Policy Description
duo {[key: string]: string}
externalIdp {[key: string]: string}

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

externalIdps {[key: string]: string}[]
fidoU2f {[key: string]: string}
fidoWebauthn {[key: string]: string}
googleOtp {[key: string]: string}
groupsIncludeds string[]
List of Group IDs to Include
hotp {[key: string]: string}
isOie boolean
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name string
Policy Name
oktaCall {[key: string]: string}
oktaEmail {[key: string]: string}
oktaOtp {[key: string]: string}
oktaPassword {[key: string]: string}
oktaPush {[key: string]: string}
oktaQuestion {[key: string]: string}
oktaSms {[key: string]: string}
oktaVerify {[key: string]: string}
onpremMfa {[key: string]: string}
phoneNumber {[key: string]: string}
priority number
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsaToken {[key: string]: string}
securityQuestion {[key: string]: string}
status string
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantecVip {[key: string]: string}
webauthn {[key: string]: string}
yubikeyToken {[key: string]: string}
description str
Policy Description
duo Mapping[str, str]
external_idp Mapping[str, str]

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

external_idps Sequence[Mapping[str, str]]
fido_u2f Mapping[str, str]
fido_webauthn Mapping[str, str]
google_otp Mapping[str, str]
groups_includeds Sequence[str]
List of Group IDs to Include
hotp Mapping[str, str]
is_oie bool
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name str
Policy Name
okta_call Mapping[str, str]
okta_email Mapping[str, str]
okta_otp Mapping[str, str]
okta_password Mapping[str, str]
okta_push Mapping[str, str]
okta_question Mapping[str, str]
okta_sms Mapping[str, str]
okta_verify Mapping[str, str]
onprem_mfa Mapping[str, str]
phone_number Mapping[str, str]
priority int
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsa_token Mapping[str, str]
security_question Mapping[str, str]
status str
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantec_vip Mapping[str, str]
webauthn Mapping[str, str]
yubikey_token Mapping[str, str]
description String
Policy Description
duo Map<String>
externalIdp Map<String>

Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

externalIdps List<Map<String>>
fidoU2f Map<String>
fidoWebauthn Map<String>
googleOtp Map<String>
groupsIncludeds List<String>
List of Group IDs to Include
hotp Map<String>
isOie Boolean
Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
name String
Policy Name
oktaCall Map<String>
oktaEmail Map<String>
oktaOtp Map<String>
oktaPassword Map<String>
oktaPush Map<String>
oktaQuestion Map<String>
oktaSms Map<String>
oktaVerify Map<String>
onpremMfa Map<String>
phoneNumber Map<String>
priority Number
Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
rsaToken Map<String>
securityQuestion Map<String>
status String
Policy Status: ACTIVE or INACTIVE. Default: ACTIVE
symantecVip Map<String>
webauthn Map<String>
yubikeyToken Map<String>

Import

$ pulumi import okta:policy/mfa:Mfa example <policy_id>
Copy

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
Okta pulumi/pulumi-okta
License
Apache-2.0
Notes
This Pulumi package is based on the okta Terraform Provider.