End-to-end phishing-resistant account updates with OAMP

In recent years, cyberattacks have increased significantly. Data breaches and phishing attacks have become common threats to individuals and businesses. According to the FBI’s Internet Crime Complaint Center, organizations lost $12.5 billion to cybercrime in 2023 alone, a nearly $10 billion increase from 2019. 

With no current way to protect account recovery and authenticator enrollment from phishing attacks, we created a customizable solution to close these gaps and protect our customers. 

We enforce two-factor authentication (2FA) assurance for enrolling and unenrolling authenticators. While this presents a solid layer of security, it still allows for the possibility of phishing. 

Account recovery and self-service password operations are controlled via password policy rules. The current implementation allows for only limited assurance customization and, again, no way to ensure phishing resistance.

What is the Okta account management policy?

With all the customizations and capabilities of authentication policies, we thought, “Why not extend them to recovery and enrollment flows?” Okta has made many investments in increasing the customizability and security of authentication policies. Reusing these capabilities seemed like a no-brainer. Enter the Okta account management policy (OAMP).

AD 4nXcXjR7YNUYrWZk7WkXsJQ7suc89ny a hsqCXsAvDmV UAa0xrzLLI45D9ze2DoM2Mn2S25RMOtrflh2ForOXFViMrcUyA0tP628gGS5DoBbsRwlWhCtcz5MY2VEmLL7ioZN3V5iw?key=HZNy60juTLxLZXrgUNydNg

We now allow administrators to define rules denying authenticator operations if policy constraints can’t be satisfied. Previously, administrators couldn’t explicitly deny authenticator enrollment or disenrollment through unmanaged devices or to users who didn’t satisfy custom assurance requirements. 

We also leveraged and expanded on the existing Okta Expression Language (EL) to give administrators granular controls when defining rules. Current password policy rules can’t support custom EL expressions. With OAMP, you can allow account recovery from a managed device through a phishing-resistant authenticator like Okta FastPass

AD 4nXeF9TZinrXpJwS7R5uQ9gCkdLDHyIbVg8vmqp4RnMPiseSL hbdNLuOVC46zCkjKJaSnQpApvfI2wH97JEF7zL297oo8ZEYjhISgXt61WJQ5c4y8ibAQhtM9oRlX9QgUJLK6ew41e51 4N0lRFQ6eWKUhqf?key=HZNy60juTLxLZXrgUNydNg

Secure onboarding and recovery

Utilizing the newly added capabilities of the Okta EL, admins can customize different assurance constraints for different actions. For example, this EL expression — accessRequest.operation == ‘recover’ || accessRequest.operation == ‘unlockAccount’ — will only apply to operations that involve resetting a password or unlocking an account.

AD 4nXdGGfqdmI59 GW2jM BGdAPGa8hZjkCDu mUEJULcGodXnRHAQ3fJsnx4ec7F4aYxq451tqzXmXRndCJRan5fwt 9Q6aDJaKWb3p3ue8wNLpd79cOgfvZIJDJRhOwf0ueJkK05Lcg?key=HZNy60juTLxLZXrgUNydNg

Now, it’s possible to securely onboard a new user by leveraging the ID verification option in OAMP, as seen with the new “Identity verification” option. An onboarding user will be asked to prove their identity with a valid government-issued ID and a liveness check selfie. This provides an extra level of assurance before a user onboards their account and enrolls authenticators.

Third-party vendors, such as Persona, can be configured within an Okta org and used in an OAMP rule to enforce user verification before any account or authenticator management operations. ID-proofing can also be extended for recovery use cases where users can be required to ID-proof before modifying their authenticators. 

AD 4nXcw5FNp74L9goiFky1mJa1 BqV2og Vf2LUwWU98geooYsrKoI28vY0Mz9zfbDt3H 5sKC32qISPfAXJ23dndTul06JVsy08ymsaPzY44jEOGQDH3J7adZfmUXQHsdGeZmWsuPwQiB4g9l AMH8zHUganlL?key=HZNy60juTLxLZXrgUNydNg

Enhanced security from day zero 

Now that admins can securely verify users themselves from day zero, we can enforce strong security controls throughout their entire journey. With social engineering attacks on the rise, securing all flows with phishing resistance is crucial. Okta’s account management policy empowers admins to accomplish this.

Learn more about the Okta account management policy.