Engineering

Implementing security best practices in Okta developer orgs

How we’ve fortified security in Okta Developer Edition Service Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…

Why Okta Verify protects your identity by pinning TLS connections

What is Public Key Pinning? Normally, traffic between a client application and its server-side relies on Public Key Infrastructure (PKI). While this mechanism is sufficient for most internet traffic, the Okta Secure Identity Commitment requires us to consider advanced, persistent, targeted attackers, even including nation state-level actors. Okta…

Unlocking success: How mentorship empowers engineers

In the dynamic field of engineering, the journey to success is often filled with thrilling highs and challenging lows. Whether it’s the exhilaration of a breakthrough, the stress of balancing demanding projects, or the pressure of an urgent hotfix, engineers face numerous obstacles.  However, with the right guidance and support, many of these…

Evolving Okta’s edge infrastructure

Okta is constantly evolving our cloud infrastructure to meet the needs of our customers. We place reliability and scalability at the core of our design decisions for services that process billions of authentications per month. This article dives into how a recent project to remove one of our most heavily trafficked services yielded significant…

Automated defense against Identity-based attacks

Identity is foundational to modern security strategy. Identity-based attacks are on the rise, and most data breaches are caused by stolen credentials. With more than 18,000 customers and an Identity platform that performs billions of authentications every month, Okta is at the frontline of most of these Identity-based attacks. In the past month…

Navigating credential and fraud risks: The phishing resistance authenticator effect

Image generated using DALL·E 2   This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organization’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organization’s proactive use…

Archive