1/33
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What do Authentication Policies control in Okta?
They control how users authenticate into applications, including required factors and assurance levels.
What are the main components of Authentication Policies?
Authentication Policies enforce MFA requirements, minimum assurance levels, device compliance conditions, context and risk rules, and step-up authentication.
What do Authentication Policies determine?
They determine who can access an application and what authentication requirements must be met before access is granted.
What are the elements that each Authentication Policy contains?
Each policy contains rules, which include conditions, access requirements, and outcomes.
What does 'step-up authentication' mean?
It occurs when a user authenticated at a lower assurance level is prompted to provide a stronger factor before gaining access to an application that requires a higher assurance level.
What is the role of assurance levels in Authentication Policies?
Assurance levels define the strength of authentication required for accessing applications, ranging from low to high assurance.
What can affect access based on device conditions?
Factors include whether the device is managed, compliance posture, operating system, and browser.
What are some examples of common Authentication Policy use cases?
Examples include sensitive applications requiring high assurance, workforce apps requiring MFA, and contractor access with restricted policies.
How are Authentication Policies evaluated in Okta?
They are evaluated each time a user attempts to access an app by identifying the policy used and checking the ordered list of rules.
What should be avoided when creating Authentication Policies?
Avoid allowing password-only access anywhere except controlled zones.