Device platform security
Okta authentication policies evaluate the user agent information included in the request header sent by the user's browser.
As malicious actors can spoof a User-Agent value, they may target the least restrictive rules in your policies.
For this reason, make sure that your authentication policies comply with your company's security needs. Consider using the following best practices when you create your policies:
- Implement an allowlist that consists of one or more rules permitting access to the app. The rules should specify the allowed combinations of client type, device platform, and trust posture.
- Require device registration, device assurance policies, or MFA to access the app. See Devices and Multifactor authentication.
- Include a final rule to deny access to any device that doesn't match any of the preceding rules.