<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authentication policy in APIs</title>
    <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885241#M667</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I was troubleshooting user authentication for Okta, which integrates with Duo via API.&lt;BR /&gt;
There some reason authentication via API falls under “Other Operating Systems” in Authentication Policy?&lt;BR /&gt;
Why would this be the case?&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 04 Oct 2016 22:02:52 GMT</pubDate>
    <dc:creator>avs1</dc:creator>
    <dc:date>2016-10-04T22:02:52Z</dc:date>
    <item>
      <title>Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885241#M667</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I was troubleshooting user authentication for Okta, which integrates with Duo via API.&lt;BR /&gt;
There some reason authentication via API falls under “Other Operating Systems” in Authentication Policy?&lt;BR /&gt;
Why would this be the case?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 04 Oct 2016 22:02:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885241#M667</guid>
      <dc:creator>avs1</dc:creator>
      <dc:date>2016-10-04T22:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885242#M668</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;We can only effectively determine the client operating system when the interactive Duo prompt displays in the browser. You can turn this on for Okta by enabling the new sign-in page.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;In the Okta admin console, go to Settings &amp;gt; Appearance&lt;/LI&gt;
&lt;LI&gt;Edit the Sign-In Configuration and enable the “New Sign-In Page” option&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;With this option on, the Duo interactive prompt will show up instead of Okta’s API buttons.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Oct 2016 14:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885242#M668</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2016-10-05T14:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885243#M669</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;We don’t allow self-enrollment for the users as per our security requirements.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Oct 2016 20:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885243#M669</guid>
      <dc:creator>avs1</dc:creator>
      <dc:date>2016-10-05T20:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885244#M670</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;That’s fine, self-enrollment isn’t required for your already enrolled users to utilize the Duo browser-based authentication prompt. Just make sure that your new user policy denies access to unenrolled users and that you haven’t enabled the self-service portal for your Okta application in the Duo Admin Panel.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;&lt;DIV class="lightbox-wrapper"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="1X_cc281c64aba55410d6746d846153893a6f91359a.png" style="width: 322px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191116iDB3D00361A9F437F/image-size/large?v=v2&amp;amp;px=999" role="button" title="1X_cc281c64aba55410d6746d846153893a6f91359a.png" alt="1X_cc281c64aba55410d6746d846153893a6f91359a.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Oct 2016 20:26:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885244#M670</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2016-10-05T20:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885245#M671</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Are you saying “other” OS is not required to be enabled under authentication policy for Okta application within Duo?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Oct 2016 20:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885245#M671</guid>
      <dc:creator>avs1</dc:creator>
      <dc:date>2016-10-05T20:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885246#M672</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;If an application is able to display the Duo web-based authentication prompt then we can usually determine the operating system (Windows, MacOS, etc.). If your use case is that access to Okta only comes from one of the operating systems we recognize, then no, you would not need to permit access to “other” operating systems.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Okta is configured to show the Duo web prompt&lt;/LI&gt;
&lt;LI&gt;The Operating Systems policy is configured to allow all versions of Windows and Android only&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;User A, on a Mac, is denied access entirely.&lt;BR /&gt;
User B, on a Windows PC but with Duo Mobile activated on an iPhone, can see the Duo prompt but cannot approve a push auth request sent to the iPhone.&lt;BR /&gt;
User C, on Ubuntu Linux, is denied access entirely.&lt;BR /&gt;
User D, on a Windows PC and with Duo Mobile activated on a Samsung Galaxy, is allowed access.&lt;/P&gt;
&lt;P&gt;Learn more about the Operating Systems policy in our &lt;A href="https://duo.com/docs/policy#operating-systems"&gt;online Policy documentation&lt;/A&gt;.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Oct 2016 21:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885246#M672</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2016-10-05T21:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885247#M673</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;The integration with Okta is API based, technically users login into Okta so Duo does not have any visibility to which OS users are using: &lt;A href="https://duo.com/docs/okta" rel="nofollow noopener"&gt;https://duo.com/docs/okta&lt;/A&gt;&lt;BR /&gt;
As far as I understand it Duo sees API call from Okta and from the Authentication policy perspective “other” has to be enabled to authenticate users from Okta as there is no specific check within Authentication Policy referencing API calls. In duo log it was showing authentication rejected based on platform. The authentication was only successfully after the option for  “other” OS was &lt;A href="http://enabled.It" rel="nofollow noopener"&gt;enabled.It&lt;/A&gt; is not stated as the prerequisite for Okta integration with Duo. Otherwise it does sound like a bug on Duo side.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Oct 2016 21:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885247#M673</guid>
      <dc:creator>avs1</dc:creator>
      <dc:date>2016-10-05T21:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication policy</title>
      <link>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885248#M674</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;If you scroll up to earlier responses in this thread you’ll see instructions for enabling the web based Duo prompt in Okta (the “New Sign-In Page” option) and also a screenshot of the Okta login experience with the Duo web prompt.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Oct 2016 13:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/apis/authentication-policy/m-p/4885248#M674</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2016-10-06T13:12:13Z</dc:date>
    </item>
  </channel>
</rss>

