<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
0D54z00009oNCLXCA4Okta Classic EngineAdministrationAnswered2025-09-13T09:01:51.000Z2023-11-02T19:23:23.000Z2023-11-15T06:33:09.000Z

User16370330549592969269 (Customer Support Online Experience) asked a question.

Special live virtual OIE meet-up on November 15 at 12 p.m. EST: Register and submit your questions in advance

Interested in upgrading to Okta Identity Engine (OIE), but have questions about the process?  How will my users be impacted?  What is this config change requirement?  What am I consenting to?  Perhaps you’re already on OIE, but have questions about new features/functionality.  What strategy should I employ to roll out FastPass?  What are the security and user experience benefits?  

 

No matter your questions, we have answers! Bring your questions and join a panel of OIE experts on Wednesday, November 15, at 12 p.m. for a special live virtual OIE Meetup session dedicated entirely to audience questions.

 

Get a head start by submitting your questions in advance by replying to this discussion thread using the ‘Answer’ button.  And register for the live session here:

https://okta.zoom.us/webinar/register/4116972178952/WN_38ACpNrgRXKgPU3JqyRS0Q

 

Can’t make the live virtual meet-up on November 15? We’ve got you covered! You can still submit questions. Then, our panel of OIE product experts will provide written comprehensive answers no later than November 17 at 5 p.m. EST.

 

 


    • User16370330549592969269 (Customer Support Online Experience)

      Hi @a0n5s (a0n5s)​ Thank you for bubbling these back up. The feature requests that are in the 'Product Review' status mean that it has hit the right level of engagement we're looking for; therefore, have been moved to Product. I will follow up with the assigned Product team member on what the status is and ask them to provide you with an update.

       

      The Ideas that you shared that are in the 'awaiting feedback' status means that it is open for voting. Votes are an important signal to our team about the demand for a feature or enhancement, and we consider them when building our roadmap. We encourage you to search for your request within Okta Ideas as your fellow community peers may have already submitted a similar idea. We will be removing duplicate requests.

      Expand Post
  • YevgenyL.65565 (Customer)

    Does Okta have a tenant security hardening document based on CIS security or something similar?

  • MichaelJ.57862 (Customer)

    Few Questions:

    • What are the expression language rules that can be used in the Authentication Policy custom expression. For example, I'm looking to build a rule that would check if a user was logged in from an IdP and if so, do not challenge for MFA. Can you provide the list of custom expressions that are available for Authentication polocies.
    • We have noticed that api/v1/sessions/me API no longer works as expected. As per my understanding and the documentation, this API can be used to extend the OKTA parent web cookie session almost as a session keep-alive. We are noticing that when hiting this endpoint, the /v1/sessions/me api is not refreshing the okta web cookie session.

     

    Expand Post
  • The Okta documentation is a bit confusing

     

    The below doc calls out that SSO extension might fail if Okta hasn't been configured as a Certificate Authority with dynamic SCEP.

     

    https://help.okta.com/oie/en-us/content/topics/identity-engine/devices/config-credential-sso-ext-macos.htm

     

    The below doc calls out If you're using Workspace ONE, use static SCEP. Workspace ONE has known issues with dynamic SCEP. (I know this is a windows doc but not sure if this Workspace ONE issue applies for Mac too)

     

    https://help.okta.com/oie/en-us/content/topics/identity-engine/devices/okta-ca-static-scep-win-ws1.htm

     

    So does this indirectly mean I cannot do MAC SSO Extension if I have WS1?

    Expand Post
  • JemD.93903 (Customer)

    Scenario: Okta Classic, Microsoft 365 WS-Fed with Okta, Windows Hello for Business (WHFB) configured in accordance with published Okta best practices: Use Okta MFA for Azure Active Directory | Okta

     

    During OIE pre-flight eligibility checks, we received the following Action Item:

     

    Office 365 Pass Claim for MFA is enabled

     

    Once upgraded to Okta Identity Engine, Authentication Policy rules must be configured for MFA in order to satisfy the requirement for passing this claim to Azure AD.

     

    When researching this item, the Okta documentation previously called this a "limitation" of the Classic Engine but has since reworded that language to the following:

     

    [In Okta Classic]...the MFA prompt from the Okta Sign On Policy alone would satisfy the requirement for the MFA claim to be sent to Microsoft. In OIE that is not possible anymore. All the Authentication Policy rules that allow access must have MFA required in order for this claim to be sent.

     

    What does this exactly mean?

     

    Reading it at face value, it states the Classic Engine fulfills the Azure AD MFA requirement, without ever prompting the user. And since this cannot happen in OIE, the user must complete the MFA request. Will users receive a step-up authentication for MFA after upgrade to OIE that they are not receiving today due to the way the Classic Engine satisfies the MFA requirement on behalf of the user?

     

    Hopefully someone who has upgraded from Classic to OIE who is configured similarly with Azure AD (aka Entra) and Windows Hello can tell us what they experienced after the upgrade to OIE and if there were issues of concern, and if so, how the issues were resolved.

     

    Thank you,

     

    J

     

    Expand Post
  • AlexanderA.31947 (Customer)

    Hello,

     

    I have enforced Okta verify for all users with 100% enrollment.

    How easy is it now to go passwordless?

This question is closed.
Loading
Special live virtual OIE meet-up on November 15 at 12 p.m. EST: Register and submit your questions in advance