STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Okta Identity as a Service (IDaaS) Security Technical Implementation Guide

V-273204

CAT II (Medium)

Okta must be configured to accept Personal Identity Verification (PIV) credentials.

Rule ID

SV-273204r1098879_rule

STIG

Okta Identity as a Service (IDaaS) Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001953CCI-002009CCI-002010

Discussion

The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DOD has mandated the use of the common access card (CAC) to support identity management and personal authentication for systems covered under HSPD 12, as well as a primary component of layered protection for national security systems. Satisfies: SRG-APP-000391, SRG-APP-000402, SRG-APP-000403

Check Content

From the Admin Console:
1. Go to Security >> Authenticators.
2. Verify that "Smart Card Authenticator" is listed and has "Status" listed as "Active".

If "Smart Card Authenticator" is not listed or is not listed as "Active", this is a finding.

Fix Text

From the Admin Console:
1. Go to Security >> Authenticators.
2. In the "Setup" tab, click "Add authenticator".
3. Select the configured Smart Card Identity Provider and finish configuration.