API

Building Consumer Trust: 4 Challenges to Offering Secure User Authentication

No brand can be successful without customer trust. But as organizations handle and store more customer data than ever—data that’s increasingly targeted by cyber criminals—that trust is harder to earn and even harder to keep. In my previous post, I discussed the various stages of the customer journey that are crucial to building and retaining user…

4 Steps to Building Consumer Trust

As cyber criminals become more refined in their exploits, customers and their personal information are being increasingly targeted—and that poses a growing threat to organizations. Today, according to the Ponemon Institute, the cost of a data breach is $3.92 million, including non-operational factors like reduced brand engagement and compromised…

Why It’s Time to Break Up with Active Directory

Do you still use a cell phone designed in 1999? Would you risk letting your teenager drive a 20-year-old car with 20-year-old airbags? Probably not. In an era of innovation and disruption, leading companies pride themselves on constantly adopting new and better technologies. So why is it that some of those same enterprises continue to rely on…

Better together: Using the Okta integration with HashiCorp Terraform

UPDATE: It's official, Okta's Terraform provider has been certified by HashiCorp! To get started, check out the official docs here. Want to contribute or open an issue? Find the project here. Organizations using Okta as their Identity layer can easily integrate Okta into their continuous integration (CI), continuous delivery (CD), and development…

How to use Webhooks with Okta

Connecting and sharing data across disparate systems is a critical part of modern-day software development. Nearly every application needs to communicate and share data across many services, both internally and externally. Businesses often have to connect internally built apps to external services such as Twilio for customer notifications, Stripe…

Customer Identity Landscape: Building Highly Scalable Apps

Today’s customers have higher than ever expectations when it comes to their digital applications. These expectations are driving products to be more sophisticated with increasingly shorter release cycles. A pivotal component when building any customer-facing application is connecting directly to users, and an identity management system that is…

5 Approaches to API Security

The goal when implementing API security is to safely ensure the right people and systems have access to the right things to accomplish their task in the shortest time necessary. In this blog we’ll take a quick look at the pros and cons of the 5 approaches to API security described in greater detail within our white paper, API Security from…

Archive