Our field employees are experiencing an MFA prompt loop when trying to clock in using the JDE mobile app for time and attendance. Here’s what happens: employee opens the app, enters credentials, receives MFA push notification, approves it, then immediately gets prompted for MFA again. This loop continues indefinitely and they can’t complete the clock-in.
The error in the mobile app log shows:
MFA validation successful
Session token received
Redirecting to clock-in screen...
Session expired - MFA required
This is causing missed punches because employees give up after 2-3 MFA attempts. We’ve had about 30 missed punch corrections in the last week alone. The issue seems to affect both iOS and Android devices, but only for the mobile clock-in function. Desktop users aren’t experiencing any MFA problems. Running JDE 9.2.2 with Duo Security for MFA. Anyone solved this mobile-specific MFA loop issue?
Another thing - check if your clock-in application is configured to require a new session for each punch. Some organizations set this for security, but it conflicts with MFA workflows. We changed our clock-in app to maintain the session for the entire shift (8-10 hours) which eliminated the repeated MFA prompts for lunch breaks and end-of-shift punch-outs.
In Duo, you need to configure the JDE mobile app as a ‘Trusted Application’ and enable the ‘Remember Device’ policy. This allows the device to be trusted for a specified period (we use 30 days) after successful MFA, so users only authenticate once per month instead of every clock-in. You’ll also need to update your mobile app configuration to store the device trust token securely in the device keychain.
Notification when punch successfully synced to server
Monitoring and Alerts:
Real-time dashboard showing MFA failure rates by device type
Alert HR when employee has 2+ failed punch attempts
Track session timeout patterns to identify configuration issues
Generate daily report of missed punches with root cause analysis
Fallback Mechanisms:
Enable SMS-based MFA as backup when push notifications fail
Provide web-based clock-in portal accessible from mobile browser
Create supervisor override capability for emergency situations
Implement grace period punch corrections: employees can add missed punch within 2 hours without approval
Testing and Validation:
Test MFA flow under various network conditions (4G, WiFi, poor signal)
Validate session persistence when app is backgrounded/foregrounded
Verify token refresh logic works correctly
Load test with concurrent users during shift change times
Implementation Priority:
Immediate: Extend session timeout to 300s, enable Duo trusted device policy
Week 1: Implement shift-based sessions and offline punch capability
Week 2: Configure heartbeat mechanism and session expiry warnings
Week 3: Deploy monitoring dashboard and failover mechanisms
Week 4: Roll out biometric MFA and comprehensive testing
This solution eliminates the MFA prompt loop through proper session management, ensures reliable mobile clock-in functionality with offline capability, and prevents punch failures through redundant mechanisms and proactive monitoring.
I’ve extended the mobile session timeout to 240 seconds and working with our security team to configure the Duo trusted application policy. Testing with a small group of employees tomorrow. Will update with results.
Good suggestions. Our mobile session timeout is set to 90 seconds which might be too short. The MFA process typically takes 30-45 seconds, but if there’s any network latency it could exceed the 90-second window. I don’t see a ‘Remember Me’ option in our Duo policy for the mobile app - is that a specific policy type I need to create?