For a user assigned to a group and assigned to an application to be prompted for a specific factor during authentication, two Factor Enrollment Policies must be created.
Both of the policies must be assigned to the same group. In this case, one policy applies if the user's IP is part of a specific zone, and the other policy applies without any IP zone configured.
- Multi-Factor Authentication (MFA)
- Okta Classic Engine
- Create a Factor Enrollment Policy and assign it to the group.
-
Set 1 factor as Required (for example, Email Authentication) and leave any other factor that the user should not use for authentication as Disabled.
-
Add a rule to this policy that specifies IF User's IP is In Zone and select the zone previously configured, AND User is accessing Specific applications (add the application this policy applies to in the empty field).
-
Create a second Factor Enrollment Policy and assign it to the same group.
-
Set a different factor as Required (for example: FIDO2(WebAuthn)).
-
Add a rule to this policy that specifies IF User's IP is Anywhere, AND User is accessing Specific applications (add the same application added to the previous policy created).
In this example, this only applies to a specific application (YouTube App).
NOTE: If this configuration is required for all applications, including the Okta Dashboard, then both Okta and Applications should be selected/enabled.
-
Set the Application Sign On Policy Rule to Prompt for factor.
-
After completing these steps, the behavior will be as such:
- When the user accesses the application using an IP that is part of the zone created (in this case, LegacylpZone), they will meet the requirements of the first Factor Enrollment Policy and will have to authenticate with the factor specific to that policy (in this case, Email Authentication).
- When the user accesses the application using an IP that is NOT part of the created zone, they will move on to the next policy and thus will have to authenticate with the factor specific to that policy (in this case, FIDO2(WebAuthn)).
-
Move the first policy created to the top of the enrollment policy list and the second policy directly under this. The enrollment policy works in order of precedence, so the most restrictive should be at the top.
NOTE:
- Multiple factors can be added to the policies, giving the user an option to select which one to authenticate with.
- This configuration applies to Okta Classic Engine.
- When a factor is changed from Optional to Required, the users who are not enrolled in that factor will be required to set it up at their next login to the Okta org.
