Add an authentication policy rule
Authentication policies are built on rules. When you create an authentication policy, it starts with a single catch-all rule that allows access to all requests with any two factor types. Configure your authenticator requirements by adding rules and prioritizing them over the catch-all.
For example, you can add one rule that prompts all users for a password. Then you can add a second rule that prompts users in a specific group for email and password authenticators.
Before you begin
Create an authentication policy
Add a rule to a policy
-
In the Admin Console, go to .
- Select the policy where you want to add a rule.
- On the Rules tab, click Add Rule.
- Enter a Rule Name.
- Configure IF conditions. These conditions specify when the rule is applied.
IF Description IF User's user type is Accept the default or specify user types to include and exclude. AND User's group membership includes Accept the default or specify user groups to include and exclude. AND User is Accept the default or specify users to include and exclude. AND Device state is Accept the default or select Registered to apply this rule only to devices enrolled in Okta Verify. See Device registration. AND Device management is If you selected a Registered device state, indicate whether the rule is applied to only devices managed by a third-party device management solution. AND Device assurance policy is If you selected a Registered device state, you can specify device assurance policies to be satisfied. See Add a device assurance policy. AND Device platform is Accept the default or select specific platforms. AND User's IP is Accept the default or specify network zones that you want to include or exclude. You can sort by zones defined or not defined in Okta, or by dynamic zones. AND Risk is By default, this rule applies to authentication attempts of any risk level. Selecting a level limits the rule to only the specified risk level. See Risk scoring. AND The following custom expression is true Optional. Specify additional conditions with Expression Language (EL). See About behavior and sign-on policies and Okta Expression Language.
-
Configure THEN conditions. These conditions specify how authentication is enforced.
THEN Description THEN Access is Deny the user’s access or allow it after successful authentication. If you deny access, skip to the last step to save your rule.
- Denied: If the user satisfies the conditions that you configured, deny access. If you choose to deny access, skip to the last step to save your rule.
- Allowed after successful authentication: If the user satisfies the conditions that you configured, allow access.
AND User must provide
This item displays the rule's settings in JSON code. It appears when you've selected these options:
- Allowed after successful authentication for THEN Access is
- Any 1 factor type or Any 1 factor type / IdP for AND User must authenticate with
- Any possession constraint for AND Factor restraints are
AND User must authenticate with Choose the authentication requirements that you want to enforce for app access. For a description of factor types, see About MFA authenticators.
Note: If IdP appears next to these authentication options, your Global Session Policy has specified an Identity Provider that can satisfy the password requirement. Users who authenticate through the specified IdP don’t need to also provide a password.
1 factor type: To enable one-factor authentication, choose one of these options.
- Password or Password / IdP requires users to enter their password every time the rule requires re-authentication. If you select this option, the Factor restraints are options aren't available.
- Possession factor requires users to provide a possession factor such as Okta Verify or email to access the app.
- Any 1 factor type or Any 1 factor type / IdP allows users to provide any single factor to access the app. If you select this option, the Factor restraints are options aren't available.
For one-factor passwordless authentication options, seeSet up passwordless sign-in experience.
2 factor types: To require users to provide two distinct factor types, choose one of these options.
- Password + Another factor or Password / IdP + Another factor
- Any 2 factor types
For two-factor passwordless authentication options, see Configure Okta FastPass.
AND Possession factor constraints are These options aren't available if you selected Password, Any 1 factor type, or Any 1 factor type / IdP in User must authenticate with. Use these settings to specify possession factor characteristics. - Phishing-resistant: Requires users to provide possession factors that cryptographically verify the sign-in server (the origin). FIDO 2 (WebAuthn) and the Okta FastPass option in Okta Verify satisfy this requirement. For details, see About MFA authenticators. Because phishing resistance implies Device bound, that constraint is selected automatically when Phishing-resistant is selected.
- Hardware protection: Requires that keys used to authenticate are stored in secure hardware (TPM, Secure Enclave) on the device. Okta Verify meets this constraint. Because hardware protection implies Device bound, that constraint is selected automatically when Hardware protection is selected.
Note: If Okta Verify is unable to store keys on the secure hardware of the device, it uses software storage. For example, TPM for Windows and Android devices, or Secure Enclave for macOS and iOS devices. In these cases, Okta Verify doesn't satisfy the Hardware protection requirement.
To identify how Okta Verify keys are stored for a device, view the
secureHardwarePresent
device attribute in the Admin Console. You can also use an Okta Expression Language (EL) expression to determine the value ofdevice.profile.secureHardwarePresentview
. If this value is true, secure hardware is used.See Custom Expressions, and View device state.
Some WebAuthn authenticators are hardware-protected. Okta uses the FIDO Alliance Metadata Service (MDS) to determine whether a WebAuthn authenticator is hardware-protected. An authenticator is considered hardware-protected when one of its keyProtection values is hardware.
Hardware-protected WebAuthn authenticators have several limitations:
- Enrollments done before Nov 30, 2022 aren't supported.
- Enrollments using FIDO U2F aren't supported.
- Enrollments on Firefox aren't currently supported.
- Enrollments on Chrome aren't currently supported if User Verification is set to Discouraged and a PIN is set on the security key.
- If prompted during enrollment, users must allow Okta to see the make and model of the security key.
- Exclude phone and email authenticators: Requires that the factor's keys are stored securely on the device and aren't transferable to another device without re-enrolling the factor. Email and SMS are the only possession factors that aren't device bound. This constraint is selected automatically if you select either of the other constraints.
AND Access with Okta FastPass is granted These options allow you to choose whether to require end users to prove that they're physically present when using Okta FastPass to authenticate. - If the user approves a prompt in Okta Verify or provides biometrics (meets NIST AAL2 requirements)
This option requires users to prove that they’re physically present.
- Without the user approving a prompt in Okta Verify or providing biometrics
If you select this option and the authentication policy requires a possession factor, Okta Verify may perform certificate-based authentication. This allows users to access the resource without proving that they're physically present. This option doesn’t meet NIST AAL2 requirements. Also, if you select this option, you can't use a Security Question as an additional factor.
Re-authentication frequency is This setting allows you to specify how often end users must re-authenticate.
- Every sign-in attempt: Users must re-authenticate every time they try to access the app.
- Never re-authenticate if the session is active: After users authenticate from their device, they aren’t prompted to authenticate again until either the maximum session lifetime is reached or they sign out of Okta.
- Re-authenticate after: Specify how often end users are required to re-authenticate. Users are prompted to re-authenticate only if they try to access the app and haven’t re-authenticated within the time interval you specified and their session hasn't expired.
Note: A 10-second grace period applies after a user authenticates with their password. During this grace period, users aren't prompted for their password again if you selected Every sign-in attempt.
Password re-authentication frequency is These two options appear only when you select Password + Another Factor or Password / IdP + Another factor. They allow you to specify a different re-authentication interval for the password and the other factor. For example, you might want to require users to re-authenticate with a possession factor every time they access the app, but require a password if more than eight hours have passed since they last authenticated. Re-authentication frequency for all other factors is - Click Save.
The next step after you add rules to a policy is to apply that policy to one or more apps. There's no limit to the number of apps that can share a policy.
Security Questions in an authentication policy
The Security Question authenticator prompts end users to enter a correct response to a question that they've selected from a list of possible questions.
- The Security Question authenticator supports authentication (MFA/SSO) and password recovery scenarios. If disabled for MFA/SSO, it's included as part of authentication policy or global session policy evaluation.
- The Security Question authenticator can be used as step-up or additional verification when password is used as the primary factor, specifically, if the primary factor in the user's global session policy is A password. Okta recommends against using Security Questions in any authentication flow.
You can configure Okta to use this authenticator for just account recovery, or for both authentication and account recovery. If you choose only the recovery option, Okta doesn't request authentication during the evaluation of your Global Session Policy.
For example, if you want to enable Okta FastPass for your users so that they can access the resource without proving that they're physically present, you can't use a Security Question as an additional factor. If you want end users to use Security Questions, you must use the A password option in the Global Session Policy.
Limitations
-
Authentication rules don't recognize ChromeBook as a ChromeOS platform if users access their resources in a Firefox or Opera browser.
-
Because Okta Verify isn’t available for ChromeOS, Okta FastPass isn’t supported. The Access with Okta FastPass is granted condition has no effect in the rules that check for ChromeOS.
-
If users sign in from a ChromeOS device, a device record isn't created.
-
You can’t use ChromeOS in custom expressions.