No—ISC does not natively control or restrict specific MFA authenticator apps (like Google Authenticator vs Microsoft Authenticator).
Yes. If Okta is configured as the IdP, you can set Okta Verify as a primary MFA factor for login by configuring appropriate Sign-On Policies in Okta. ISC will simply delegate authentication to Okta, and whatever MFA policies are enforced in Okta will apply.
If using Azure AD (Microsoft Entra ID) — Use Conditional Access Policies
If using Okta: Configure Authenticator Enrollment Policies
At last ISC does not provide APIs or configuration to restrict MFA methods
I would recommend Azure AD as the preferred option, given its strong integration and security capabilities. Okta can be considered as the secondary option, particularly for environments requiring broader multi-platform support.
This is generally an IdP-side control rather than an ISC-native control. ISC does not currently give you a clean way to restrict users to a specific authenticator app such as Microsoft Authenticator only, or to explicitly block Google Authenticator at the ISC layer.
If you need to enforce Okta Verify or Microsoft Authenticator specifically, the recommended pattern is to federate authentication through your external IdP and enforce MFA there:
use Okta sign-on / authenticator enrollment policies for Okta Verify
use Microsoft Entra Conditional Access / authentication method policy for Microsoft Authenticator
In that model, ISC delegates authentication and relies on the MFA decision made by the IdP. So yes, Okta Verify can be your primary MFA factor for login if Okta is the IdP, but not as an ISC-native authenticator control.