Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >
article

KB-38956: Can an OATH One Time Passcode setup from one tenant be used as a MFA factor on a federated tenant

Privileged Access Service ,  

11 August,20 at 07:56 PM

Question:
Can an OATH One Time Passcode (OTP) setup from one tenant be used with a federated tenant?

Answer: 
Unfortunatly this is not possible. The OATH OTP must be setup seperatly on the federated tenant.

OATH tokens are attached to the host name when created, its part of the protocol (and embedded in the 'data' used to generate OTPs). So if the OATH token was created for .my.centrify.com for example, it can not work on .my.centrify.net.

For interactive login (not agents, ssh/rdp) for a federated user, redirection to the IDP occurs, and OATH token is usable (as authentication is occuring on the IDP at its host name). For cases like SSH/RDP/agents, there is not redirection, so the OATH token registered to the IDP cannot be used.

For this reason the OATH OTP must be setup seperatly on the federated tenant.

Still have questions? Click here to log a technical support case, or collaborate with your peers in Centrify's Online Community.