Modify authentication policies for first-party apps
Every org has three first-party apps: the Okta Admin Console, the Okta Dashboard, and the Okta Browser Plugin. These apps have preset policies that you can modify for your own org.
-
To share the Okta Dashboard or Okta Browser Plugin policy, see Add apps to an authentication policy. You can't share or switch the Okta Admin Console policy.
-
To add a rule to an Okta app policy, see Add an authentication policy rule.
-
To edit an Okta app policy, see Update an authentication policy. Or, refer to the following common use cases.
Configure re-authorization frequency for the Admin Console
A common use case for editing the Okta Admin Console policy is to create a more restrictive policy that requires admins to re-authenticate with MFA every time they access the Admin Console. By default, this policy requires MFA for admins, but if your Global Session Policy already requires MFA, the admin isn’t prompted a second time.
-
In the Admin Console, go to .
-
Select the Okta Admin Console app.
-
On the Rules tab, click Add rule.
-
Enter a Rule Name (for example, MFA once per day).
-
Set the following rule conditions:
-
In the IF section, select The following users and groups, and then add the Admin group.
-
Modify the Location and Client fields if you want to restrict this rule by zone or device.
-
In the Access section, select prompt for factor, and then choose your frequency.
-
-
Click Save.
-
On the Sign On tab, verify that the new rule has the highest priority.
Disable the Okta Dashboard for specific groups
A common use case for editing the Okta Dashboard policy is to disable access for users in your org who use another dashboard or application.
-
In the Admin Console, go to .
-
Select the Okta End-User Dashboard app.
-
On the Rules tab, click Add rule.
-
Enter a Rule Name (for example, Disable Access to Dashboard for Groups).
-
Set the following rule conditions:
-
In the IF section, specify which users qualify for the new rule.
-
In the THEN section, set the Access is option to Denied.
-
Related topics
Add an authentication policy rule