From 08d5c1d9fc036a53d7583502ae170c2788be2338 Mon Sep 17 00:00:00 2001 From: Duane Waddle Date: Wed, 23 Mar 2022 06:45:22 -0500 Subject: [PATCH] Adds support for Okta Verify risky login challenge Should fix #643 --- pkg/provider/okta/okta.go | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/pkg/provider/okta/okta.go b/pkg/provider/okta/okta.go index 042f029c6..30ba26e4b 100644 --- a/pkg/provider/okta/okta.go +++ b/pkg/provider/okta/okta.go @@ -799,6 +799,10 @@ func verifyMfa(oc *Client, oktaOrgHost string, loginDetails *creds.LoginDetails, switch gjson.Get(body, "factorResult").String() { case "WAITING": + correctAnswer := gjson.Get(body,"_embedded.factor._embedded.challenge.correctAnswer") + if(correctAnswer.Exists()) { + log.Println("Number Challenge Value is %d", correctAnswer.Int()) + } time.Sleep(3 * time.Second) logger.Debug("Waiting for user to authorize login") updatedContext, err := getMfaChallengeContext(oc, mfaOption, resp)