Skip to main content

Configure Desktop MFA for Windows Devices with Okta SSO

Updated this week

This guide walks you through configuring Okta Desktop MFA for Windows login, including:

  • Okta Verify enrollment

  • Creating the Desktop MFA app in Okta

  • Retrieving Client ID and Client Secret

  • Deploying Okta Verify for Windows

  • Testing Windows lock screen MFA

This setup enables Windows users to authenticate with Okta MFA at the Windows lock screen.


Requirements

Before you begin:

  • ARM-based Windows devices are not supported

  • Windows devices must be joined to Active Directory or Microsoft Entra ID

  • Users must have an active Okta account

  • Okta Verify must be installed on a mobile device (iPhone, iPad, or Android) or Windows device. You can learn more at the Okta Verify app installation.


Step 1 – Enroll in Okta Verify

  1. Sign in to your Okta account

  2. When prompted, set up Okta Verify

  3. Install Okta Verify on:

    • iPhone / iPad (App Store) or Android (Google Play) for Okta login 2FA

    • Windows for Desktop MFA function (Step 4)

  4. Scan the QR code shown on screen or use the setup link

  5. Enter the verification code from the Okta Verify app when prompted


Step 2 – Enable Interaction Code

In Okta Admin Console:

  1. Go to Settings → Account

  2. Under Embedded widget sign-in support

  3. Ensure the Interaction Code is checked

This is required for Desktop MFA authentication flows.


Step 3 – Add the Desktop MFA Application

  1. In the Admin Console, go to Applications → Applications

  2. Click Browse App Catalog

  3. Search for Desktop MFA

  4. Click Add Integration



Configure the Application

You can:

  • Adjust the Application username format if needed

  • Assign the app to users or security groups


Retrieve Client Credentials

After adding the integration:

  1. Open the Desktop MFA app

  2. Go to the General tab

  3. Copy:

    • Client ID

    • Client Secret

These are required for Windows deployment via MDM.


Step 4 – Download and install Okta Verify for Windows

You can learn more at the Okta Verify app installation for Windows.


Step 5 – Test Windows Lock Screen MFA

After installation:

  1. Lock the Windows device

  2. At the sign-in screen, choose the Okta sign-in option

  3. Enter your Okta username (we used username as an example at Step 3: Configure the Application.

  4. Approve the request in Okta Verify or enter a One-Time Password (OTP)

You should now be able to authenticate using Okta Desktop MFA.


What Happens After Setup?

Once configured:

  • Windows login will require Okta authentication

  • Users will receive:

    • Push notifications

    • One-time passcodes

  • MFA is enforced at the Windows lock screen


Troubleshooting

MFA option not appearing on lock screen

  • Confirm device is AD or Entra joined

  • Confirm Desktop MFA app is assigned to the user

Installation fails

  • Ensure ARM device is not used

Did this answer your question?