Lifecycle Management

Whether an employee’s role changes, transfers, or ends, each stage in the lifecycle requires access to different tools and systems. Lifecycle Management automates the entitling and provisioning tasks needed with each step in the employee’s journey, saving IT time and increasing security in the process. These articles can tell you more.

Stories from the Trenches: Scale & Growth in the Cloud

Rubrik burst onto the scene in 2014 as a leading provider of cloud-based data management and protection solutions. The Church of Jesus Christ of Latter-day Saints was founded in 1830, and over its long history has become a nexus of philanthropy and faith. At first glance, these two organizations have little in common—but there’s more to this odd…

The Enterprise Strikes Back: A Star Wars Story

I spent many of my childhood weekends watching Episodes IV-VI of Star Wars, the world's most famous “space opera.” Recently, it occurred to me that if the Galactic Empire had adopted a Zero Trust security model, it might have prevailed over Skywalker and the Rebels. Specifically, one could argue that the destruction of the Death Star was caused by…

How Thoughtworks Gained Better Security and Increased Productivity—by Losing Their Dependence on AD

Thoughtworks began its journey away from Active Directory (AD) less than three years ago, though Philip Ibarrola, Thoughtworks TechOps Head of Technology, says it was a long time coming. Thoughtworks was once a Microsoft-only shop: Microsoft servers, Windows-based laptops, and security and authentications, all managed by AD. But since 2011, the…

The Production Line: A Roundup of Productivity

  In April of this year, we dreamed up The Production Line as a place to capture the Okta features that might have been flying slightly below your radar, or possibly hiding in plain sight. But it was also a place to hear from you, our users, who had things to say about each of these features, as well as the series itself. Now that the year is…

How to Enforce Least Privilege Access on Linux Servers Using Sudo

Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time. In a true Zero Trust world, granting access through the front door isn’t enough, you also need…

The Production Line: Workday as Primary

  In this edition of The Production Line, we provide you with a twofer; a mini-series all about HR-driven provisioning. This month and next, we’ll be zeroing in on this key feature of Okta Lifecycle Management (LCM). As you’re probably aware, Okta has a number of pre-built HR integrations—and that’s what we’ll delve into in next month’s post. But…

We’re Looking at the Future, and It Doesn't Have Passwords

We’re rapidly moving towards the enterprise of the future—but what does that look like? It could be a place where employees have intelligent interactions with machines, or an environment where commuting becomes obsolete because we can show up to meetings as holograms. No one can say for sure what the future looks like—but based on today’s trends,…

Here’s How You Solve the Lifecycle Management Problem

Every time you hire a new employee, a number of things must happen across HR and IT teams to get them access to the systems and tools they need to do their job. At the core of these onboarding processes is your company’s identity management (IDM) system, which monitors your employees’ lifecycles from beginning to end—every hire, role change,…

Archive