My Oracle Support Banner

How to use the Google Authenticator, Microsoft Authenticator, Salesforce Authenticator, or Authy Authenticator for One-Time Password (OTP) Second-Factor Authentication Instead of the Oracle Access Manager Mobile Authenticator (OMA) (Doc ID 2479561.1)

Last updated on MARCH 11, 2021

Applies to:

Oracle Access Manager - Version 11.1.2.3.0 and later
Information in this document applies to any platform.
Oracle is not responsible for instructions/information from 3rd party sites that may be contained in this KM note.



Goal

When setting up Oracle Access Manager to do second-factor authentication (SFA) via one-time-pin (OTP) the documentation references using the Oracle Mobile Authenticator (OMA) application. This note will detail how to configure and use the Google Authenticator, Microsoft Authenticator, Salesforce Authenticator, or Authy Authenticator applications to generate and deliver one-time-pins to be used for OAM authentication.

Solution

To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!


In this Document
Goal
Solution
 Configure the OAM Server Identity Domain
 Generate a Secret Key for the End-User
 Install the Google Authenticator Application
 Configure an Account Within the Google Authenticator
 Install the Microsoft Authenticator Application
 Configure an Account Within the Microsoft Authenticator
 Install the Salesforce Authenticator Application
 Configure an Account Within the Salesforce Authenticator
 Install the Authy Authenticator Application
 Configure an Account Within the Authy Authenticator
References

My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.