This article clarifies the enrollment requirements for the FIDO2 (WebAuthn) authenticator factor.
- FIDO2 (WebAuthn)
- Multi-Factor Authentication (MFA)
FIDO2 (WebAuthn) authenticator enrollments, such as Touch ID, are attached to a single browser profile on a single device.
-
To use a FIDO2 (WebAuthn) authenticator on multiple browsers or devices, a new FIDO2 (WebAuthn) enrollment must be created in each browser and on each device.
-
If multiple Google account profiles are used in the Google Chrome browser, a new FIDO2 (WebAuthn) enrollment must also be created for each Google account profile.
-
The FIDO2 (WebAuthn) authenticator only grants access via the URL it was enrolled on. For example, an authenticator enrolled on
<domain>.okta.comonly allows access through<domain>.okta.com, and an authenticator enrolled on a custom URL only allows access through that custom URL. -
To allow access to the organization through both a standard Okta URL and a custom URL, the FIDO2 (WebAuthn) authenticator must be enrolled separately for each URL.
