/

Okta Integration Network - BYO IDV

Okta Integration Network - BYO IDV

The Okta BYO IDV integration embeds 1Kosmos identity verification into Okta account management policies, triggering biometric and document checks during high-risk actions like password recovery.

Integration type

Marketplace

Updated

Overview

1Kosmos integrates with Okta as a custom identity verification provider through Okta's Bring Your Own IDV capability. Administrators can trigger government ID and biometric verification during high-risk account actions like password recovery or authenticator enrollment. The integration uses OIDC with PAR, sending verification results back to Okta for policy evaluation without users leaving Okta.

What we solve

High-risk account actions—like password recovery and authenticator enrollment—are prime targets for social engineering, and standard IAM controls may not prove the user’s real-world identity. This Okta BYO IDV integration triggers 1Kosmos document and biometric verification inside Okta policies so organizations can require proof of identity at the moments that matter most.

This integration is separate from the standard Okta SSO integration. It does not replace authentication; it adds verified identity proofing as a policy-enforced step within Okta's account management layer. Organizations can configure multiple IDV vendors in parallel and route users to different vendors by group or region.

Prerequisites

  • Active 1Kosmos tenant with IDV enabled: Contact your 1Kosmos representative to confirm IDV is active and that an OIDC application has been created for the Okta BYO IDV integration.

  • Okta Identity Engine (OIE): BYO IDV requires Okta Identity Engine. Classic Engine does not support this feature.

  • Okta MFA or Adaptive MFA license: Required to configure identity verification in Account Management Policies.

  • Okta administrator access: Rights to manage Identity Providers and Account Management Policies in the Okta Admin Console.

Configuration values

Values to collect from 1Kosmos before configuring Okta:

Field

Where to find it

Client ID

AdminX → Applications → [your OIDC app] → Client Credentials

Client Secret

AdminX → Applications → [your OIDC app] → Client Credentials

Issuer

AdminX → Settings → Authorization Server → Metadata URI → issuer field

PAR Request URL

AdminX → Settings → Authorization Server → Metadata URI → pushed_authorization_request_endpoint

Authorize URL

AdminX → Settings → Authorization Server → Metadata URI → authorization_endpoint

Token URL

AdminX → Settings → Authorization Server → Metadata URI → token_endpoint

JWKS URL

AdminX → Settings → Authorization Server → Metadata URI → jwks_uri

Integration steps

Step 1: Create an OIDC application in AdminX for Okta BYO IDV

  • Log in to the AdminX portal and navigate to Applications → Add Application → OIDC → Add Integration.

  • Enter a name such as "Okta BYO IDV".

  • Set Grant Type to Authorization Code.

  • Set Signing Algorithm for ID Token to RS256.

  • Add Okta's redirect URI in the Sign-in Redirect URIs field. This value is available in the Okta Admin Console after adding the custom IDV provider (see Step 2). You may need to create the application first with a placeholder and update the redirect URI after.

  • Enable the openidprofile, and identity_assurance scopes.

  • Click Create and copy the Client ID and Client Secret from the resulting credentials screen.

Step 2: Add 1Kosmos as a custom IDV provider in Okta

  • In the Okta Admin Console, navigate to Security → Identity Providers.

  • Click Add identity provider and select Custom ID verification. Click Next.

  • Enter a unique Instance name (e.g., "1Kosmos IDV").

  • Under End user sign-in experience, enter "1Kosmos" as the Vendor name.

  • Enter the Client ID and Client Secret collected from AdminX.

  • In the Endpoints section, enter the Issuer, PAR Request URL, Authorize URL, Token URL, and JWKS URL values collected from the 1Kosmos metadata URI.

  • Confirm the Scope field contains openidprofile, and identity_assurance.

  • Click Finish. Copy the Redirect URI that Okta generates and add it to the 1Kosmos OIDC application's Sign-in Redirect URIs field in AdminX.

Step 3: Configure the Okta Account Management Policy

  • In the Okta Admin Console, navigate to Security → Identity Providers (or Policies, depending on your OIE version) and locate Account Management Policies.

  • Create or edit a policy rule for the user actions you want to protect (e.g., password recovery, authenticator enrollment, account unlock).

  • Add a condition requiring identity verification and select 1Kosmos as the IDV provider.

  • Assign the policy to the relevant user groups.

  • Save and activate the policy rule.

Step 4: Test the integration

  • Trigger a policy-covered action with a test user account (e.g., initiate a password reset from the Okta login screen).

  • Confirm the user is redirected from Okta to the 1Kosmos verification flow.

  • Complete the document scan and biometric selfie in the 1Kosmos flow.

  • Confirm the user is returned to Okta with a VERIFIED result and is able to complete the requested action.

  • Test a failure scenario to confirm the FAILED result correctly blocks the action in Okta.

Integration notes

The BYO IDV integration only covers Okta Account Management Policy actions (password recovery, authenticator enrollment, account unlock). It does not apply to standard App Sign-in policies; those require a separate Okta integration type.

Organizations requiring IDV for app sign-in should contact 1Kosmos to discuss the appropriate integration path. Okta passes the user's First Name and Last Name attributes from Universal Directory to 1Kosmos as part of the PAR request. Optional fuzzy matching can be configured if document names may not exactly match directory values.


Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.