Arch Tubi Admins Guide to Okta Verify Desktop (OVD) + Zero Trust Authorization (ZTA) Troubleshooting

 

Okta Verify Desktop is a new posture check tool that InfoSec has mandated to rollout for FTEs (full time employees) only. The rollout isn't happening at one time, we're seeing people gain it on their machines over the last few months. 

We've seen some Users who have OVD on their machines and have a loop logging in / issues authenticating.

IT has acknowledged that there are weird bugs they're still working through. 

 

Training Plan _ Okta Verify For IT Support Teams.pdf

 

Multiple Users log into the same Host, new User can't authenticate with Okta Verify Desktop. 

 

- Verify in Task Manager that Crowdstrike falcon version is 7.15.x (at the time of this Oct 7 2024). 

- Verify that Tanium is installed. 

- Is Okta Verify Desktop installed? If not, Arch Tubi Admins have been provided with the installer and silent installation CLI (running with Admin). 

 

This is happening because the machines posture check for that User isn't passing, creating an issue for Okta. 

 

Solution is to copy the Zero Trust Authorization (ZTA) json patch locally to:

C:\ProgramData\Okta\OktaVerify\Plugins\com.okta.ztaDefault.json

 

Open Okta Verify Desktop and remove User if they are already input. 

Start with a clean OVD:

 Click Get Started then Next. 

For New Account, enter: myfox.okta.com

 Hit Next. This launches a web browser to authenticate Okta. 

Once Okta is signed in, the new User will be enrolled in Okta Verify Desktop and displayed. 

If prompted to add Windows Hello, hit Skip. 

 

- First, try Samantha Ramos
(She can see in Okta if verifications are getting rejected and why, like if Crowdstrike version is outdated and rejecting the posture check)

- Escalate to Fox Engineers

- Emergency case: Ignatius Ho & Lavelle Evans 

Reply

null