<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Configurable Lockout Settings for Multi-Factor Authentication Failure Attempts
Okta Identity Engine
Multi-Factor Authentication
Overview

This article clarifies whether it is possible to configure a user lockout policy based on a specific number of Multi-Factor Authentication (MFA) failure attempts.

Applies To
  • Okta Identity Engine (OIE)
  • Multi-Factor Authentication (MFA)
Solution

Okta does not provide a configurable setting in the Admin Console to define the number of allowed Multi-Factor Authentication (MFA) failure attempts before a lockout occurs.

In Okta Identity Engine (OIE), the system automatically locks a user’s authenticator for five minutes after five consecutive incorrect MFA codes. This action results in a temporary lockout and a 429 Too Many Requests error.

For details on configuring password lockout settings, refer to How to Configure the Number of Failed Login Attempts Before User Lockout.

Loading
Configurable Lockout Settings for Multi-Factor Authentication Failure Attempts