Add a rule for password recovery and account unlock
Add this rule to require phishing-resistant authenticators when users unlock their accounts or reset their current passwords. Consider adding a secondary rule for users who need to reset an expired password. See Enable password expiry.
Prerequisites
If your org uses the third-generation Sign-In Widget, upgrade to version 7.20 or later for all brands.
All users in your org must be eligible to use the phishing-resistant authenticators. See Create an authenticator enrollment policy.
Before you begin
Change the access control settings in your password policy.
-
In the Admin Console, go to .
- In the Password row, click .
- In the Rules section, click the edit icon for the default rule.
- In the Recovery authenticators section, set the Access control condition to Authentication policy.
- Click Update rule.
- Repeat steps 3 through 5 for any other password policy rules.
- Review the Users can perform self-service condition in each rule. If the unlock and recovery processes aren't covered by the existing rules (together or combined), add a rule that specifically allows them. New rules that you add default to the Authentication policy setting.
Add the rule
-
In the Admin Console, go to .
- Select Okta Account Management Policy.
- Click Add Rule.
- Enter a descriptive rule name, like Phishing-resistant password and account recovery.
- Set the following IF conditions.
- User type: Any user type
- User group membership includes: Any
- User is: Any
- Device platform is: Any platform
- User's IP is: Any
- Risk is: Any
- The following custom expression is true: accessRequest.operation == 'recover'|| accessRequest.operation == 'unlockAccount'
- Set the following THEN conditions.
- Access is: Allowed after successful authentication
- User must authenticate with: Possession factor
- Possession factor constraints are: Phishing resistant
- Authentication methods: Allow any method that can be used to meet the requirement
- Prompt for authentication: Every time a user signs in to a resource
- Click Save.
Your new rule is added immediately above the catch-all rule.
Exceptions
Admin-initiated password reset flows don't enforce the Okta account management policy. The user must click the link in the email, but they're not prompted for more factors.
Password expiration flows don't enforce the Okta account management policy unless you enable password expiry.
Okta recommends securing all of your apps by requiring MFA in your authentication policies.
User experience
There are no changes to the user experience when you move password recovery and account unlock to the account management policy.
- When a user resets their current password, they can't use it as a factor if you require password + another factor. Ensure that there are at least two more authenticators, besides password, that the user can authenticate with.
- Keep me signed in works with the account management policy if you configure the authentication frequency correctly. The Prompt for authentication setting must be more frequent than the equivalent setting in the authentication policy for the End-User Dashboard. Setting Prompt for authentication in your Okta account management policy to every time ensures that users don't have to wait to reset a password.
- User enumeration prevention isn't supported in recovery scenarios with the Okta account management policy.
User settings
If a user doesn't satisfy the requirements of this rule, the Reset and Remove options for password are hidden. Authenticators that they haven't enrolled are also hidden.
Related topics
Okta account management policy