Configure MFA for the Mobile Authenticator App

Select OMA, so that Oracle Identity Cloud Service you can use Mobile Authentication App to allow or deny access to Oracle Identity Cloud Service.

  1. In Oracle Identity Cloud Service console, expand the Navigation Drawer Navigation Drawer, click Security, and then Factors.
    The Factors page opens, and the Mobile App tab is selected by default.

The default values for the Passcode Policy section are the industry-recommended settings. There is no need to change any of these values.

Although there are no specific requirements about using rooted devices or an older operating system version, the Compliance Policy section allows you to define such verification:

  • Mobile authenticator app version check: Block users from using an outdated app.
  • Minimum OS version check: Block users from using the app on a device that has an outdated operating system. Users won't receive push notification requests and won't be able to generate passcodes.
  • Rooted devices check (iOS and Android only): Block users from using the app on a device that is rooted or where rooted status is unknown. Users won't receive push notification requests and won't be able to generate passcodes.

The Compliance Policy section also allows you to define device screen lock verification. Device screen lock check can be used to prevent users from using the app on a device that doesn't have a screen lock or where the screen lock status is unknown. Users won't receive push/pull notification requests and won't be able to generate passcodes.