<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Understanding PIN Behavior: Why Okta Desktop MFA Requires a Security Key PIN Online, But Not Offline
Multi-Factor Authentication
Okta Identity Engine
Overview

It is expected behavior for a user to be prompted for a Security Key PIN when authenticating online with Okta Desktop MFA, but not when authenticating offline. This difference is due to the authentication protocol changing based on network connectivity, even when using the same physical security key.

Applies To
  • Product: Okta Desktop MFA
  • Authenticator: Security Key (for example, YubiKey)
  • Scenarios: Online vs. Offline authentication attempts
  • Okta Identity Engine (OIE)
Cause

The single security key serves two distinct functions based on connectivity:

  • Online: It uses the FIDO2 (WebAuthn) protocol, which requires User Verification (a PIN or biometric) as a core part of its phishing-resistant design and security standard.
  • Offline: It switches to the OATH protocol (a TOTP generator), which does not require a PIN. For OATH, possession of the physical key is sufficient for the second factor, as the key generates a time-based one-time password (TOTP) that is validated locally.
Solution

This is not an issue requiring a fix; it is the intended design for Okta Desktop MFA. The solution is to understand and communicate the expected behavior:

  • Online Authentication: Always have the security key PIN ready, as the FIDO2 standard and Okta policies require it for user verification.
  • Offline Authentication: Simply Insert and Tap the security key, as no PIN is required for the OATH-based offline factor.

Use Offline security key to sign in with Okta Device Access

Loading
Understanding PIN Behavior: Why Okta Desktop MFA Requires a Security Key PIN Online, But Not Offline