Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using okta-awscli[U2F] does not work with yubikey #139

Open
icadariu opened this issue Sep 29, 2020 · 1 comment
Open

Using okta-awscli[U2F] does not work with yubikey #139

icadariu opened this issue Sep 29, 2020 · 1 comment

Comments

@icadariu
Copy link

Describe the bug

  • Trying to use okta-awscli with yubikey returns error related to the U2F
Enter password:
ERROR - Unsupported factorType: webauthn
Registered MFA factors:
1: Okta Verify - Push
2: Okta Verify

To Reproduce
Steps to reproduce the behavior:

  1. execute okta-awscli

Expected behavior

  • I expected to be able to use YubiKey to verify the login

Output
Output of your okta-awscli run, using the --debug flag

INFO - STS credentials are valid. Nothing to do.
INFO - Force option selected, getting new credentials anyway.
INFO - Using base-url from default profile some_okta_subdomain.okta.com
Enter username: some_user
Enter password: *hidden*
INFO - App Link set as: None
ERROR - Unsupported factorType: webauthn
Registered MFA factors:
1: Okta Verify - Push
2: Okta Verify

Environment (please complete the following information):

  • OS: MacOS
  • Version of okta-awscli you're running. okta-awscli -V
okta-awscli -V
0.4.1

Additional context
In case this is not a bug, but I forgot to install/configure something, please point me to the right direction.

@kholia
Copy link

kholia commented Jul 25, 2023

Hi Folks - I have #221 PR open now which adds support for FIDO2 YubiKey(s).

Can you please test this PR, and provide some feedback? Thanks!

CC @icadariu as well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants