This article outlines the steps to configure Password Manager 5.16 with Okta as a 2FA provider.
Login to Okta and create a new application:

Provide a name for the application. In this example we are using OID PM federation.
Configure the SAML settings as follows:

Finish the configuration.
Once the app is created, open the properties and navigate to the Sign-on tab.
Under the SAML 2.0 section, copy the metadata URL as you will need this to configure the Authentication provider in Password Manager.
Example:

Navigate to PMAdmin | Component Settings | Secure Token Server.
Add a new Authentication Provider and fill in the required fields using this example. In the Get federation metadata URL section, paste in the URL you copied from Okta above.

NOTE: Ensure users are assigned in Okta. By default, claims will use userPrincipalName and Okta matches the user in Active Directory. If you require additional or custom entries in the provided claims, please follow the instructions from Okta's documentation: https://help.okta.com/oie/en-us/content/topics/apps/federated-claims-overview.htm?cshid=federated-claims-overview
© 2026 One Identity LLC. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center