Enterprise-CMCS / eAPD

CMS (Centers for Medicare and Medicaid Services) eAPD - Modernizing the APD experience
https://eapd.cms.gov
Other
58 stars 25 forks source link

[Feature] Enable MFA OKTA Push Verification #3088

Open eStar386 opened 3 years ago

eStar386 commented 3 years ago

Description and related issues - If a user comes to our application having already enabled only push notifications on their Okta account, they will not be able to login with our system. Because of this fact, we should enable push notifications as a MFA factor in our application.

What is the goal or purpose of this ticket? We want to give valid users the easiest time logging in as possible. If they have already set up their Okta account, they shouldn't have to change things in order to use our system.

Acceptance Criteria

This task is done when...

beparticular commented 3 years ago

@tbolt and @eStar386 will take a look and determine if OKTA Verify is something we are or aren't set up to use and what the severity and priority of this bug should be

Updated with notes from discussion and/or parking lot: Context: The site doesn’t display using google authenticator. If the user has a EUA ID existing user and only installed OKTA verify app. What is the intended functionality? Are users required to use google authenticator?

Currently, Google Authenticator is the defacto MFA and for all other updates see note below.

eStar386 commented 3 years ago

Update from 05/12 parking @thetif will update issue with relevant information.

eStar386 commented 3 years ago

Please note: Currently users with Okta Push setup attempting to access the website using the traditional OTP receive this erroneous message:

CurrentOTPErrorMessage