Devices known issues and workarounds
Before you contact Okta Support, review this list to determine if the issue is a known problem that might have a workaround.
Operating system | Issue | Details and solution |
---|---|---|
Android iOS macOS Windows |
Users on unmanaged devices receive an erroneous MDM remediation message. |
This issue occurs when an org has multiple device management configurations for the same platform and each configuration integrates with a different solution. For example, if one of your Windows device management configurations integrates with Microsoft Intune and another with Workspace ONE. When a user on an unmanaged device tries to access an app that is associated with one of the configurations and the authentication policy requires a managed device, Okta displays an Additional setup required remediation message. The message includes the name of the solution and a link to their enrollment site. When multiple device management configurations exist for the same platform, the remediation message pulls information from the earliest created configuration. Therefore, the message might reference the wrong device management solution and include a link that points to the wrong enrollment website. |
Android iOS macOS Windows |
End users who are deactivated in Active Directory are able to enroll in Okta Verify. |
When an Active Directory (AD)-sourced user prepares to set up Okta Verify from the Settings page on the Okta End-User Dashboard, the enrollment QR code is displayed. If the user is deactivated in AD before they scan the QR code, they could still scan the QR code and enroll in Okta Verify. A QR code generated before a user is deactivated in AD remains valid until they time out. Even if the user is able to enroll into Okta Verify successfully, they can't access any Okta-protected apps. To resolve this issue, delete unwanted Okta Verify enrollments from the Admin Console. |
Android iOS macOS Windows |
Users don't receive the Okta FastPass setup prompt when multiple orgs exist. |
If you're using Okta FastPass to sign in to a multi-org environment and Okta FastPass isn't set up for all orgs, the Okta FastPass enrollment prompt might not appear. To avoid this issue, make sure Okta FastPass is set up for all orgs. |
Android iOS macOS Windows |
Users aren't able to remove their account from Okta Verify if they're deleted from Active Directory. |
To resolve this issue, delete the user enrollment from Okta. |
Android iOS macOS Windows |
Users enrolled in Okta Verify are denied access to an app. |
Okta isn't able to probe for device context, so users are denied access when they authenticate with a username and password. This issue occurs if you're using a service account and your authentication policy rules are:
Use the following steps to work around this issue:
|
Android iOS macOS Windows |
Okta Verify enrollment isn't automatically triggered when an admin portal URL is used. |
If a user doesn't have an Okta Verify account, enrollment is automatically triggered when they enter their org URL (for example, http://exampleorg.okta.com) in a browser. However, if the user enters their admin portal URL (for example, http://exampleorg-admin.okta.com), the browser redirects the user to their org URL, but the enrollment isn't automatically triggered. To avoid this issue, use the org URL instead of the URL for the admin portal. |
Android |
Okta Verify authentication issues when users sign in from WebView |
Sign in with Okta FastPass isn't supported in WebView on native Android apps. If the Okta Verify app isn't running in the background, Okta can't probe for device context and the user may be denied access, depending on the app sign-on policy. Share these workarounds with your users:
|
Android |
Biometrics are unavailable for users on Android 12 devices. |
On Android 12, you can't enable biometrics if Okta Verify is installed on your work profile. To work around this issue, skip the biometrics enablement step if you can. |
iOS, Safari |
Unmanaged iOS authentication issues when users have iCloud Private Relay enabled. |
Phishing-resistant factor restraints don't work on unmanaged devices if iCloud Private Relay is enabled. If unmanaged iOS devices are specified in the authentication policy and you want to require phishing-resistant factor restraints, then users must disable iCloud Private Relay before authenticating. Share these workarounds with your users:
|
New users without a password can't complete the Okta Verify enrollment process. |
When attempting to activate their account in Okta Verify for iOS, new users without a configured password receive an Authenticator operation is not allowed error message. This prevents the completion of the enrollment process. To work around this issue, the user (or an admin) can set a password factor before enrolling the device in Okta Verify. Alternatively, the user can enroll in Okta Verify using a non-iOS device and then add the account to their iOS device. |
|
macOS |
Users can't access the Google Drive File Stream app. |
Okta Verify single sign-on (SSO) fails when a user tries to access a Google Drive File Stream app that is protected by a policy permitting passwordless access. To resolve this issue, click Sign in with your browser instead to access the app. |
macOS |
macOS occasionally fails to prompt users for Touch ID when they authenticate with Okta Verify |
This is a known issue for macOS Big Sur and earlier. Apple has fixed the issue for macOS Monterey. To resolve this issue, the user must restart Okta Verify. |
macOS |
Users don't receive device lifecycle messages |
Device lifecycle messages aren't available on macOS devices that use an SSO extension profile. This only affects Safari users with macOS Big Sur and earlier. |
Windows |
Okta Verify authentication issues when users have multiple OS profiles |
When a Windows device has multiple operating system (OS) user profiles and the same account is added to Okta Verify on several user profiles, only the most recent enrollment by the last user profile works. If the same Okta Verify account is used in a different user profile, the authentication fails. |