Configure Desktop MFA for Windows to use FIDO2 keys

Early Access release

Setting up a FIDO2 (WebAuthn) authenticator allows users to securely sign in to their devices using a security key.

You can register these keys through the Admin Console, or the user can register their key in their Okta End-User Dashboard.

As an alternative, Yubico can deliver the YubiKey directly to new users, already pre-enrolled with the user's data and your org configuration.

PIN support

Desktop MFA for Windows supports FIDO2 security keys with or without a PIN.

If you enable User verification in your authentication policy, users can verify their identity with the FIDO2 key as long as you also enable User verification in the FIDO2 (WebAuthn) settings.

To use a security key with a PIN, set the User verification to Required in both the FIDO2 (WebAuthn) authenticator settings and in your authentication policy. See App sign-in policies.

Limitations

When configuring FIDO2 security keys for use with Desktop MFA for Windows, be aware of the following limitations:

  • FIDO2 security keys can't be used for offline authentication.

  • FIDO2 passkeys and biometric-only keys aren't supported.

  • FIDO2 platform authenticators aren't supported.

Tasks

Set up the FIDO2 (WebAuthn) authenticator

To enable users to authenticate with a FIDO2 key, set up the FIDO2 (WebAuthn) authenticator in the Admin Console.

  1. In the Admin Console, go to SecurityAuthenticators.

    If you already have the FIDO2 (WebAuthn) authenticator added, you can't add another. Ensure that the settings for the existing FIDO2 (WebAuthn) authenticator are appropriate for your org.

  2. Click Add authenticator.

  3. From the list of authenticators, click Add under FIDO2 (WebAuthn).

  4. On the General settings page, click Edit.

  5. Under Settings, use the dropdown menu to select a User verification method. Review the content below the setting to learn more about what each user verification type does.

    Desktop MFA always requires that the user has a PIN. If the key has no PIN and you set the User verification method to Preferred or Discouraged, then Desktop Password Autofill asks for the system password.

  6. Click Save.

After you set up the FIDO2 (WebAuthn), individually configure your user accounts to use the keys. Users can also complete the registration themselves. See User registers a FIDO2 key

Enable FIDO2 for the Desktop MFA client

Create a PowerShell script and use your MDM to deploy the registry keys to your endpoints. Note the individual storage locations of each registry key.

Registry Key Description

Name: AllowedFactors

Type: REG_MULTI_SZ

Default: *

List of factors that users can authenticate with.

Store the AllowedFactors key at HKLM\Software\Policies\Okta\Okta Device Access.

The AllowedFactors list requires that you also enable UseDirectAuth.

Possible values for this setting:

  • * - all factors are allowed. This is the same as setting this value to empty.

  • OV_Push

  • OV_TOTP

  • Offline_TOTP

  • FIDO2_USB_key

  • Offline_Security_key

Ensure that the factors are spelled correctly.

A user can be locked out of their computer if the factors included the AllowedFactors list don't match the factors shown to the user by the OfflineLoginAllowed and OnlineLoginAllowed registry settings.

Name: PasswordlessAccessEnabled

Type: REG_DWORD

Default: 0

This value enables password autofill, allowing users to sign in to their device securely using non-password factors.

Store the PasswordlessAccessEnabled key at HKLM\Software\Policies\Okta\Okta Device Access.

By default, password autofill is disabled (0).

Password autofill supports Okta Verify Push and FIDO2 keys when you specify these as AllowedFactors.

Desktop MFA always attempts to enforce user verification through the FIDO2 key PIN. If the key doesn't have a PIN, then Desktop MFA falls back to password authentication.

Name: UseDirectAuth

Type: REG_DWORD

Default: 0

This value enables the FIDO2 protocol for Desktop MFA so that users can authenticate with FIDO2 security keys.

Store the UseDirectAuth key at HKLM\Software\Okta\Okta Device Access.

By default, this setting is disabled (0).

If the Okta username doesn't match the Microsoft User Principal Name (UPN), you can configure multiple identifiers on the user profile policies. This allows users to be identified with their UPN attribute. The steps to implement this workaround are available in this knowledge base article.

Configure FIDO2 keys

There are several ways that you can prepare a FIDO2 key for your users:

  • Register a FIDO2 keys on behalf of a user.

  • A user registers their own FIDO2 key.

  • Use a pre-enrolled YubiKey. See Set up YubiKey - Okta flow.

Choose the registration method that works best for your org.

Register a FIDO2 key on behalf of a users

  1. In the Admin Console, go to Directory People.
  2. Click a user to open their profile.
  3. Click More Actions and choose Enroll FIDO2 Security Key from the list.
  4. Insert the FIDO2 key into your computer and click Register.
  5. Follow the prompts until you receive confirmation that the FIDO2 key has been successfully registered to the user.
  6. Give the enrolled FIDO2 key to the appropriate user.

User registers a FIDO2 key

If a user receives a FIDO2 security key, they can register it using the Okta End-User Dashboard. Encourage your users to set up the security key with the appropriate settings for your org.

  1. Sign in to the Okta End-User Dashboard.
  2. Click your name in the upper-right corner and select Settings.
  3. Under Security Methods, locate Security Key or Biometric Authenticator and click Set up another.
  4. Verify your identity with one of the presented options, and then click Set up.
  5. Follow the prompts to register the FIDO2 key to your Okta account.

After the user successfully registers the security key, they can verify their identity by inserting the FIDO2 key into the Windows device and following the on-screen prompts.

When users enroll the FIDO2 factor, they're limited to the org's URL. For example, if users enroll the FIDO2 factor on your orgname.okta.com URL, the factor only allows access to your org with that same orgname.okta.com URL. If users enroll the FIDO2 factor using the custom URL for your org, the factor only allows access to your org with the custom URL.

Admins must configure Desktop MFA to use the same domain where users have enrolled the FIDO2 authentication factor.

Next steps

Optional. Enable self-service password reset for Windows

Optional. Enforce number challenge for Desktop MFA for Windows

Optional. Configure Desktop Password Autofill for Windows