<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
0D54z00006zl3VQCAYOkta Classic EngineMulti-Factor AuthenticationAnswered2022-09-23T20:56:46.000Z2021-05-31T13:58:44.000Z2021-05-31T15:28:57.000Z

Patrickv.40677 (Customer) asked a question.

Is there an alternative way to remember device for MFA challenge in okta-signin-widget?

We implemented a custom loginpage with the okta-signin-widget which is running on our own domain (call it mydomain.com)

When the widget is initialized, several cookies are created on this domain, like JSESSIONID and DT (DeviceToken?).

We have configured our signin policies so that our users have to sign in with MFA. We would like to make it more convenient for our users by prompting them for MFA only once every 8 hours so we configured our MFA policy to prompt per session and set the factor lifetime to 8 hours.

So now, when a user signs in, he can check the checkbox "Do not challenge me on this device for the next 8 hours" and we should be good.

 

However, it is not working. My assumption is that it has to do with the DT cookie, which is (logically) set to mydomain.com, while the widget communicates with the okta backend via the domain mydomain.okta-emea.com. The same-site policy prevents the okta backend from receiving the DT cookie, hence-forth the "do not challenge me .." feature doesn't work.

 

We cannot bind our mydomain.com domainname to our okta tenant because AWS route53 dns policies do not allow that.

 

Is there an alternative way to send the DeviceToken to the okta backend?


This question is closed.
Loading
Is there an alternative way to remember device for MFA challenge in okta-signin-widget?