Salto for
Okta
Articles
SHARE
Omin Patel
May 28, 2024
10
min read
Multi-Factor Authentication (MFA) is a basic yet very strong security measure used by many organizations to create a layered defense and make gaining access more difficult for unauthorized persons. MFA requires users to provide two or more forms of authentication: the first usually being “something you know” (e.g., password, pass-phrase, PIN) and the second being “something you have” (e.g., phone app, hardware token, YubiKey) or “something you are” (e.g., biometric data such as fingerprints or a face or retina scan).
With MFA deployed org-wide, the organization has a second layer of security to protect against common password-based attacks, such as Brute Force attacks, Dictionary attacks, Keylogging, Rainbow Table, and others. Basically, with MFA enabled, an attacker cannot gain access to a user’s account even if they know the password. This way, MFA serves as a critical defense against unauthorized access by requiring users to provide multiple forms of verification.
While MFA should always be enforced, there will be cases where it’s necessary to temporarily bypass MFA for specific users without compromising the overall security of the company.
Situations in which you may need to access applications without MFA are:
Now that we understand the need for bypassing MFA, let’s go over the steps to set up the policies and configurations in Okta. This setup will allow a specific user to access Okta SSO applications without Okta Verify or MFA, whenever that user exists in a “Bypass MFA” Okta group. This way, the MFA bypass can easily be reversed by simply removing the user from the Bypass MFA group.
Note: If Okta still asks for MFA after going through all the configuration steps, then Authentication Policies will need to be adjusted per application to allow access via password only. The authentication policy should look like the screenshot below, where the Password is the only requirement
As this is a temporary MFA bypass concept, a part of this process is to define how long you want to allow your users to bypass MFA. For example, a user who lost their phone may need this freedom for a day, whereas a System Administrator may need to bypass MFA only for a few hours. It is simple to reverse the MFA bypass; the user will once again require MFA when removed from the Temp MFA Bypass group. Based on this use case, it is recommended to remove the user from the bypass group as soon as possible. This will ensure that the security of MFA once again applies to the user’s Okta account.
If you have a small team and are receiving a lot of requests to bypass MFA, you can go a step further and use the fancy automations.
You would start with creating a Jira Request type with approvals in the workflow. Once the Jira ticket is approved, it can trigger a workflow in Okta. Then, you would set up the Okta workflow to trigger if the Jira ticket is approved, and then add an action to add the user to the Temp MFA Bypass group. To revert the MFA requirement, you can create the workflow for time-based group membership, which will do the job of removing the user from a group after a specified amount of time. In the event that you have multiple Temp MFA Bypass groups, with each group allowing different durations of MFA bypass, the Okta workflow can have conditions to scan each of these groups and remove the user from the group once they reach the set time limit.
Security should never create a blocker for your teams, so it’s always a good idea to proactively configure and roll out a temporary MFA bypass setup for users who may need it. Having a temporary bypass for specific users ensures that your employees stay productive and that your company’s overall security is not compromised.
Salto for
Okta
Okta
SHARE
Omin Patel
May 28, 2024
10
min read
Multi-Factor Authentication (MFA) is a basic yet very strong security measure used by many organizations to create a layered defense and make gaining access more difficult for unauthorized persons. MFA requires users to provide two or more forms of authentication: the first usually being “something you know” (e.g., password, pass-phrase, PIN) and the second being “something you have” (e.g., phone app, hardware token, YubiKey) or “something you are” (e.g., biometric data such as fingerprints or a face or retina scan).
With MFA deployed org-wide, the organization has a second layer of security to protect against common password-based attacks, such as Brute Force attacks, Dictionary attacks, Keylogging, Rainbow Table, and others. Basically, with MFA enabled, an attacker cannot gain access to a user’s account even if they know the password. This way, MFA serves as a critical defense against unauthorized access by requiring users to provide multiple forms of verification.
While MFA should always be enforced, there will be cases where it’s necessary to temporarily bypass MFA for specific users without compromising the overall security of the company.
Situations in which you may need to access applications without MFA are:
Now that we understand the need for bypassing MFA, let’s go over the steps to set up the policies and configurations in Okta. This setup will allow a specific user to access Okta SSO applications without Okta Verify or MFA, whenever that user exists in a “Bypass MFA” Okta group. This way, the MFA bypass can easily be reversed by simply removing the user from the Bypass MFA group.
Note: If Okta still asks for MFA after going through all the configuration steps, then Authentication Policies will need to be adjusted per application to allow access via password only. The authentication policy should look like the screenshot below, where the Password is the only requirement
As this is a temporary MFA bypass concept, a part of this process is to define how long you want to allow your users to bypass MFA. For example, a user who lost their phone may need this freedom for a day, whereas a System Administrator may need to bypass MFA only for a few hours. It is simple to reverse the MFA bypass; the user will once again require MFA when removed from the Temp MFA Bypass group. Based on this use case, it is recommended to remove the user from the bypass group as soon as possible. This will ensure that the security of MFA once again applies to the user’s Okta account.
If you have a small team and are receiving a lot of requests to bypass MFA, you can go a step further and use the fancy automations.
You would start with creating a Jira Request type with approvals in the workflow. Once the Jira ticket is approved, it can trigger a workflow in Okta. Then, you would set up the Okta workflow to trigger if the Jira ticket is approved, and then add an action to add the user to the Temp MFA Bypass group. To revert the MFA requirement, you can create the workflow for time-based group membership, which will do the job of removing the user from a group after a specified amount of time. In the event that you have multiple Temp MFA Bypass groups, with each group allowing different durations of MFA bypass, the Okta workflow can have conditions to scan each of these groups and remove the user from the group once they reach the set time limit.
Security should never create a blocker for your teams, so it’s always a good idea to proactively configure and roll out a temporary MFA bypass setup for users who may need it. Having a temporary bypass for specific users ensures that your employees stay productive and that your company’s overall security is not compromised.