Overview
This article guides you through configuring Traceless to send MFA challenges via Okta Verify. You'll learn how to enable Okta Verify as an identity verification method and how to use it within Traceless to securely authenticate users.
Prerequisites
Access to your organization's Okta admin console.
Traceless account with integration setup complete.
Admin access to configure MFA methods within Traceless settings.
Step-by-Step Instructions
1. Enable Okta Verify in Traceless
Log into Traceless
Navigate to https://traceless.io/okta/connect/
Enter in your Okta domain, the email domain of the users you are planning to verify and your API key
Click Create to apply changes.
2. Using Okta Verify With Traceless in your PSA ticket view (ConnectWise, ServiceNow, Jira, etc):
Once enabled, Okta Verify becomes an option in the Traceless interface:
Open a ticket and find the Traceless UI.
Select the MFA tab. A dropdown for MFA methods appears—choose Send Okta Verify.
Click Send Push.
The user will receive a notification via Okta Verify.
Once they approve the push or return the code, the UI will update with a green checkmark. This action logs the verification in the ticket (audit trail).
FAQs
Q. Can Okta Verify be used to secure trace links automatically?
Absolutely. You may choose to use the "Require MFA" option when sending a Trace for extra security for a specific user.
Troubleshooting
Issue | Solution |
Okta Verify not visible as an option | Ensure it's enabled in MFA settings and your API integration is correctly configured in Traceless. |
Verification rates failing | Confirm Okta credentials and push notifications are properly set up in the Okta console. |
No audit entries logged | Verify that Traceless has the correct permissions when interacting with your PSA. |