You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can set the provider to "Browser" and then use --download-browser-driver at login but launching a browser is a less than ideal method of authenticating a command line tool that has options to support pin entry.
Would love to know if there's a work around, patch or path we're missing. Thanks.
Description:
We're setting up FIDO2 yubikeys with okta and found that even though okta will prompt in the UI for pin, saml2aws will not.
Details:
When enforcing, the following stacktrace is thrown:
Work around
You can set the provider to "Browser" and then use
--download-browser-driver
at login but launching a browser is a less than ideal method of authenticating a command line tool that has options to support pin entry.Would love to know if there's a work around, patch or path we're missing. Thanks.
Related to: #419 (comment)
The text was updated successfully, but these errors were encountered: