Hello, Okta Advanced Server Access

We’re excited to launch Okta Advanced Server Access, a new product available today that brings continuous, contextual access management to secure cloud infrastructure. Advanced Server Access centralizes access controls for organizations leveraging on-premises, hybrid, and cloud infrastructure in a seamless manner to mitigate the risk of credential…

Okta Hooks: Unlock Extensibility

There have historically been two types of integration in the Okta Integration Network: single sign-on for access and lifecycle management for provisioning and deprovisioning. Today, we’re pleased to launch a new, third type of integration: Okta Hooks. Okta Hooks enables customers to use their own code to easily customize Okta policies and…

Okta Auth API: We roll auth so you don’t have to

Secure authentication is crucial for customers using your app. But building an authentication model for your application from the ground up is not easy for your developers. From dealing with conflicting user schemas to easing the flow of data between components, managing and protecting user accounts is probably not your team’s favorite part of…

Introducing the Okta Community Toolkit

We are excited to announce the Okta Community Toolkit, a collection of open source content built by our community of customers, partners, and developers. The Toolkit allows you to explore and discover the unlimited use cases and the infinite integrations possible with Okta. Our goal at Okta is to securely connect the right people to the right…

CSA Summit Panelists Talk Disruptive Technologies at RSA19

At RSAC19, The Cloud Security Alliance hosted a discussion titled, “The Approaching Decade of Disruptive Technologies,” featuring security leaders from Duo, Centrify, Onapsis, and Okta’s own Executive Director of Cybersecurity Strategy, Marc Rogers. IOActive CEO Jennifer Steffens led the session with the intent of discussing what disruptive…

Mobile Apps: Why Legacy WAM Can’t Protect them

In recent years, there’s been an explosion of mobile apps for consumers. With this paradigm shift away from on-premises apps, legacy Web Access Management (WAM) solutions are failing to support customer applications outside the traditional firewall perimeter. Read on to learn exactly what WAM is, and why its architecture can’t protect mobile apps…

What to Look Forward to at Oktane19

Attendees from 36 countries. 3.4K social media posts. 72 customer speakers. 7 product announcements. These are just some of the highlights from last year’s Oktane conference in Las Vegas. This year, we’ve brought Oktane home to San Francisco, where we will host thousands of industry leaders from April 1-4 at the Moscone Center. At Okta, we’re…

Password spraying detection: Where do I start?

Password spraying has been one of the hottest topics in cyber security in the last few years. Right off the heels of multiple high-profile breaches, it’s been getting a lot of attention from security vendors, reporters, and the security community as a whole. In this post, we’ll discuss why password spraying is increasing in prevalence, and steps…

Why Fintech Firms Need Cloud-Powered Identity Management to Grow

The UK’s fintech sector is a global success story, generating an estimated 60,000 jobs and contributing $7 billion annually to the economy. Thousands of start-ups are offering innovative solutions to common challenges, using new technologies and processes to succeed in what is already a highly competitive space. But in the quest for cloud and…

What is WebAuthn?

In March 2019, the World Wide Web Consortium (W3C) announced that WebAuthn is now the official web standard for password-free login. With support from a broad set of applications (Microsoft Edge, Chrome, Firefox, Mobile), widespread adoption of WebAuthn is expected in coming years. In this post, we will explore the shortcomings of current…

Archive

Follow Us
Share on Linkedin Share on Youtube