Trusted app filters

Early Access release. See Enable self-service features.

Trusted app filters for Okta FastPass allows orgs to manage which applications can invoke Okta FastPass in Windows, and in Chrome and Firefox for macOS. Specifically, trusted app filters enable the blocking of unsigned binaries and creating an allowlist of binaries. Blocking unsigned binaries prevents unsigned binaries from invoking Okta FastPass, which enhances security against unauthorized or malicious software. Creating an allowlist of binaries allows you to specify which binaries are permitted to invoke Okta FastPass, ensuring that only trusted applications have this ability.

Enable trusted app filters

Trusted app filters for Okta FastPass is an Early Access Feature. Enable the feature in the Admin Console:

  1. In the Admin Console, click Settings Features.

  2. Locate the Trusted App Filters for Okta FastPass line and click the button to enable the feature.

Once Trusted App Filters for Okta FastPass has been enabled, you can create your queries using Okta Expression Language.

Configure trusted app filters

Locate the binaryIdentifier

You can control which binaries or applications can invoke the Okta FastPass loopback server by configuring a query using Okta Expression Language in your authentication policy. Building the query requires the binaryIdentifier of the app that you want to block or allow. This information is found within System Logs.

  1. Open your System Logs and locate the log called Authentication for the user via MFA .

  2. Scroll to the event AuthenticationContext AuthenticatorContext binaryIdentifier.

  3. Copy the value of the binaryIdentifier to use in your query. For example, in Windows the binaryIdentifier for Chrome is Google Chrome. For macOS, the binaryIdentifier for Google Chrome is EQHXZ8M8AV.com.google.Chrome.helper.

Do this for each application that you want to allow or block from invoking Okta FastPass.

Build the query

You can control which binaries or applications can invoke the Okta FastPass loopback server by configuring a query using Okta Expression Language in your authentication policy.

Query Description Example
Binding type The binding method used in authentication. Currently, only LOOPBACK binding method is supported. device.caller.bindingType == "LOOPBACK"

Validation status

This represents whether the binaries are signed or not. If a binary is signed, then it can be represented as a SUCCESS.

device.caller.validationStatus == "SUCCESS"

Binary/application identifier

This identifies the application that you want to allow to invoke Okta FastPass. The binary that identifies applications can be found within System Logs. Ensure that the value is copied and pasted exactly as shown to avoid errors.

device.caller.binaryIdentifier == “Google Chrome”

device.caller.binaryIdentifier == "43AQ936H96.org.mozilla.firefox"

You can combine the queries together in your authentication policy to block the unsigned app from invoking the loopback server:

Copy
device.caller.bindingType == "LOOPBACK" && 
device.caller.validationStatus == "SUCCESS" &&
(device.caller.binaryIdentifier == "EQHXZ8M8AV.com.google.Chrome.helper" || device.caller.binaryIdentifier == "43AQ936H96.org.mozilla.firefox")

The resulting query is added to your app sign-on policy in the Expression Language field.

Trusted app filters are effective when the binding type is set to loopback. Ensure that this setting is configured correctly for the feature to work as intended.

Blocking unsigned binaries

  1. In the Admin Console, open Security Authentication Policies and click the policy that you want to edit.

  2. Click the Actions dropdown menu beside the Rule that you want to add the EL query to, and click Edit.

    1. Optional: You can create a New Rule in your app sign-on policy and add your EL query there. See Authentication policies.

  3. In the Expression Language field, enter your query to block unsigned applications from invoking Okta FastPass:

    • device.caller.validationStatus == SUCCESS

  4. Paste this query into all authentication policies for the apps that you want to secure from local attacks targeting Okta FastPass.

  5. Click Save.

Creating and managing an allowlist of binaries

  1. In the Admin Console, open SecurityAuthentication Policies and click the policy that you want to edit.

  2. Click the Actions dropdown menu beside the Rule that you want to add the EL query to, and click Edit.

    1. Optional: You can create a Rule in your app sign-on policy and add your EL query there. See Authentication policies.

  3. In the Expression Language field, write an EL query to allow specific applications to invoke Okta FastPass. Copy the values shown for the binaryIdentifier field from the System Log to build the query. For example, to add Google Chrome to an allowlist, the EL query would read device.caller.binaryIdentifier == "EQHXZ8M8AV.com.google.Chrome.helper", where EQHXZ8M8AV.com.google.Chrome.helper is the value obtained from the System Log.

  4. Click Save.

Related topics

Phishing-resistant authentication

Add an authentication policy rule

Add a custom expression to an authentication policy

Expression Language attributes for devices

Okta Expression Language reference