- Okta Windows Credential Provider
- FIDO2 WebAuthn
- Remote Desktop (RDP)
Okta Windows Credential Provider uses a core version of IE/Edge (embedded browser). As such, FIDO2 webauthn is not supported/functional, as Okta does not support embedded web browsers for WebAuthn-based user verification documentation.
Allow the use of another MFA Factor, such as Okta Verify, SMS, Phone, Yubikey, or similar OTP.
A potential workaround to implement biometrics would be through Okta Verify.
- Okta Classic Engine
From the Admin Console, navigate to Security > Multifactor.
-
If Okta Verify is not enabled, enable it and click Edit.
-
Enable the "Require Touch ID or Face ID for Okta Verify (only on iOS)" option.
-
- Okta Identity Engine
From the Admin Console, navigate to Security > Authenticators.
-
On the Setup tab, click the actions drop-down corresponding to Okta Verify, and choose Edit.
-
From here, modify "User verification" from "Preferred" to "Required".
-
Related References
-
For reference on configuring Okta Verify in Okta Classic, see Configure Okta Verify.
-
For reference on configuring Okta Verify in Okta Identity Engine (OIE) see Configure the Okta Verify Authenticator.
