How to find Okta users without MFA?

tL;dr

Use Okta reports or API to find users without MFA

To find Okta users without MFA, use the Okta admin console or API to check okta MFA enrollment status. The key is filtering the Okta user list based on their multi-factor authentication status. If you’re serious about access management, you’ll want visibility into who’s bypassing MFA, and why.

Most folks assume Okta just handles MFA out of the box and that once a policy is in place, everyone complies. Not quite. Even with a policy in place, enrollment is only as good as its enforcement. That’s where you (or your super admin) come in. You need to see who’s actually enrolled, who’s ignoring it, and who’s somewhere in limbo.

Instead of drowning in audit logs or clicking endlessly in the admin console, just build your own view with Sola’s Access Control Okta Insights app. Plug in your Okta instance, define your question like “show me all users who haven’t enrolled in MFA” using our AI agent, and the answer is right there. You can even customize it further to get more clarity.

Understand your Okta user list and permissions

Okta’s user management model gives super admins the power to view MFA enrollment across all users, but you need to know where to look. You can start from the Admin Console under Reports > Authentication > MFA Enrollment. Here, you can export a list showing who’s in and who’s out.

Want to go deeper? Use Okta’s API (/api/v1/users) to fetch the Okta user list, then correlate it with the factor enrollment endpoint (/api/v1/users/${userId}/factors). This lets you programmatically sift out users without any enrolled factor.

Pro tip: Watch out for users with no assigned apps. They often fall through the cracks when enforcing MFA. And remember: not all admins are created equal. You need super admin permissions to see the full picture.

Implementation tips: Don’t just enforce, monitor

Enforcing MFA isn’t a one-time deal. People leave, roles change, new apps get added. Make sure your process includes regular reviews of MFA status, especially for privileged users. Automate it if you can (hint: Sola can help).

Integrate checks into your access management flow. Before granting new permissions or app access, validate MFA enrollment. You can even turn it into a trigger for alerts or conditional access policies.

Answer more security questions

Get early access
Snag a better spot on the waitlist by signing up with a business email address
By pressing the button above, you confirm that you have read, understood, and agree to the privacy policy and terms and conditions.
Just a couple more questions...
By pressing the button above, you confirm that you have read, understood, and agree to the privacy policy and terms and conditions.
You're on the waitlist!

Keep an eye on your inbox (and maybe your spam folder) for an update soon.

Spread the word, we like attention.