Configure and deploy Desktop MFA policies for macOS
Configure Desktop MFA behavior and deploy managed profiles to your macOS computers.
You can use any device management (MDM) solution that supports deploying macOS installer packages and configuration profiles. These instructions assume the use of Jamf Pro for device management.
When you deploy the Desktop MFA MDM profiles, ensure that they've been successfully pushed to devices before deploying the macOS Okta Verify package. If the MDM profile doesn't exist on the user's device when the package installer runs, Desktop MFA isn't installed.
Tasks
- Upload the Okta Verify for macOS package
- Configure the installation of Desktop MFA for macOS
- Add Desktop MFA policies
Upload the Okta Verify for macOS package
-
Take the Okta Verify for macOS package that you downloaded from the Okta Admin Console and upload it to your MDM solution.
-
In Jamf Pro, go to .
-
Click + New to configure the package details.
Configure the installation of Desktop MFA for macOS
- In Jamf Pro, click and click + New.
- Enter a Display Name and select Login for the policy Trigger.
- Click Packages and then click Configure.
- Locate the Okta Verify package that you uploaded in the previous step and click Add next to the package.
- Configure the Distribution point.
- Using the dropdown menu, select Install as the Action.
-
Click Save.
Ensure that the MDM profile has been successfully deployed to end user devices before deploying the macOS Okta Verify package.
Add Desktop MFA policies
-
In Jamf Pro, click Configuration Profiles and then click + New.
-
Enter a name for the profile.
-
Click Application & Custom Settings to configure the payload. Click Upload.
-
Click + Add.
-
Enter com.okta.deviceaccess.servicedaemon as the Preference Domain.
-
Add the values for your organization as a plist file. Here's an example plist file:
Copy<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>DMFAClientID</key>
<string>add-your-client-ID-here</string>
<key>DMFAClientSecret</key>
<string>add-your-client-secret-here</string>
<key>DMFAOrgURL</key>
<string>https://add-your-org-URL-with-prefix-here</string>
<key>AccountLinkingMFAFactor</key>
<string>OV_Push</string>
<key>AdminEmail</key>
<string>admin@yourorg.com</string>
<key>AdminPhone</key>
<string>111-222-3333</string>
<key>AllowedFactors</key>
<array>
<string>*</string>
</array>
<key>DeviceRecoveryPINDuration</key>
<real>60</real>
<key>DeviceRecoveryValidityInDays</key>
<real>90</real>
<key>LoginPeriodWithoutEnrolledFactor</key>
<real>48</real>
<key>LoginPeriodWithOfflineFactor</key>
<real>168</real>
<key>MFANotRequiredList</key>
<array/>
<key>MFARequiredList</key>
<array>
<string>*</string>
</array>
<key>OfflineLoginAllowed</key>
<true/>
</dict>
</plist>
Policy parameters
Use the following table to configure the appropriate parameters for your Desktop MFA policies.
Next steps
Enforce number challenge for Desktop MFA for macOS
Configure Desktop MFA for macOS to use FIDO2 keys