User Management: An Afterthought for Some, Prerequisite for Others

You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system? This scenario may sound odd, but…

Decentralized Identity: The future of digital Identity management

Decentralized Identity is a methodology that allows individuals to securely control their digital Identity without relying on a central authority. The need for decentralized Identity Traditional Identity models do not protect user interests and can leave personal information vulnerable. Decentralized Identity helps close the gap on a growing list…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorization credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

What is a One-Time Password (OTP)?

A one-time password or passcode (OTP) is a string of characters or numbers that authenticates a user for a single login attempt or transaction. An algorithm generates a unique value for each one-time password by factoring in contextual information, like time-based data or previous login events. Tech support teams typically administer OTPs to…

What is SCIM?

SCIM, or System for Cross-domain Identity Management, is an open standard that allows for the automation of user provisioning. It was created in 2011 as it became clear that the technology of the future would be cloud-based. SCIM communicates user identity data between identity providers (such as companies with multiple individual users) and…

Unlocking success: How mentorship empowers engineers

In the dynamic field of engineering, the journey to success is often filled with thrilling highs and challenging lows. Whether it’s the exhilaration of a breakthrough, the stress of balancing demanding projects, or the pressure of an urgent hotfix, engineers face numerous obstacles.  However, with the right guidance and support, many of these…

Fine Grained Authorization: A flexible solution for all

Authorization is evolving. Users demand more nuanced access controls and privacy, while security and compliance teams need precise permission management. Enter a new approach: Okta Fine Grained Authorization. Now, you can manage your teams’ need for precise permissions while maintaining independence from any Identity provider (IdP), including but…

DORA is coming. Are you ready? 

5 steps you need to take to be prepared for next year’s deadline DORA is set to transform the financial services sector by enhancing cybersecurity and operational resilience across the EU. Okta’s Stephen McDermid explains what DORA means for the finance sector and why many firms are turning to automation to manage the complex layers of regulation…

Archive

Follow Us
Share on Linkedin Share on Youtube