DISA STIGS Viewer

The Okta Admin Console application must be configured to allow authentication only via non-phishable authenticators.

Overview

Finding ID Version Rule ID IA Controls Severity
V-273191 OKTA-APP-000190 SV-273191r1099764_rule   Medium
Description
Requiring the use of non-phishable authenticators protects against brute force/password dictionary attacks. This provides a better level of security while removing the need to lock out accounts after three attempts in 15 minutes.
STIG Date
Okta Identity as a Service (IDaaS) Security Technical Implementation Guide 2025-05-06

Details

Check Text (C-77282r1098838_chk)
From the Admin Console:
1. Go to Security >> Authentication Policies.
2. Click the "Okta Admin Console" policy.
3. Click the "Actions" button next to the top rule and select "Edit".
4. In the "Possession factor constraints are" section, verify the "Phishing resistant" box is checked. This will ensure that only phishing-resistant factors are used to access the Okta Dashboard.

If in the "Possession factor constraints are" section the "Phishing resistant" box is not checked, this is a finding.
Fix Text (F-77187r1098839_fix)
From the Admin Console:
1. Go to Security >> Authentication Policies.
2. Click the "Okta Admin Console" policy.
3. Click the "Actions" button next to the top rule and select "Edit".
4. In the "Possession factor constraints are" section, ensure the "Phishing resistant" box is checked.