
January 2025: This is an Early Access release
Introduction
We now have the capability to define which authentication methods users are allowed to utilize by setting a new registry value called AllowedFactors on Windows devices.
This enhancement provides greater control and customization over authentication policies, allowing organizations to fine-tune security measures and align them with specific operational needs.
Prerequisites
- Okta Device Access – Desktop MFA configured in your environment
You can follow this blog to implement it - Okta Verify version 5.5.4 or later is installed on all Windows devices to enable
Allowed Factors functionality
Configure Allowed Factors policy
To configure the Allowed Factors policy for Okta Device Access Desktop MFA, it’s necessary to deploy a specific registry key to your endpoints.
The registry key must be configured appropriately across all systems where you intend to leverage the Allowed Factors option as part of the desktop multi-factor authentication (MFA) setup.
The Allowed Factors registry key needs to be added under the following registry path:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Okta\Okta Device Access
| Value name | Description | Values | Default value |
| AllowedFactors | A list of factors that users can authenticate with. The allowed factors appear in the order that they’re listed in your configurations. If no factors are specified, all factors are allowed. Ensure that the factors listed are spelled correctly. Accepted values for AllowedFactors are: – OV_Push – OV_TOTP – Offline_TOTP – FIDO2_USB_key | REG_MULTI_SZ | * |
This is an example of how the registry entry should appear, providing clarity on the correct configuration for the AllowedFactors value.

To enable the Allowed Factors list, the UseDirectAuth setting must be activated in HKEY_LOCAL_MACHINE\SOFTWARE\Okta\Okta Device Access
If no specific factors are listed, the system defaults to allowing all available factors. It is crucial to ensure that the specified factors are accurately spelled to avoid configuration errors or authentication issues.

Demo
This demo showcases the Allowed Factors feature within Okta Device Access Desktop MFA, highlighting how we can customize and control user authentication methods.
