single sign-on

Juggling multiple login credentials isn’t just a chore for end users; with the amount of cumbersome password resets they must facilitate, IT suffers, too. SSO simplifies the process from both sides, giving users a single point of access and self-service rest options, and Okta’s take is one of the best. Here’s why.

DonorsChoose + Okta: Investing in Classrooms, Increasing Organizational Security, and Developing Talent

I graduated from college in 2019 and was set on finding a job in the social good sector where I could combine my technical skills with mission-driven, equity-forward work. I wanted to combine my past experience working in the nonprofit space with my newfound love of computer science, but finding the right fit was a challenge. Then I found…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorization credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

Byte-Sized Video: Don’t Limit the Scope of Your SSO and MFA

No matter how much you may love your users, you can’t trust all of them. With so many individuals and devices accessing your apps, and requests coming from various networks, there’s a real risk of bad actors slipping through the cracks. Single-sign on (SSO) and multi-factor authentication (MFA) are must-haves when it comes to modern security. To…

Announcing Okta SSO for HashiCorp Terraform Cloud for Business

Companies of all kinds and sizes are adopting more cloud infrastructure and employing DevOps programs to streamline the delivery and operations of software. In doing so, they begin to foster a culture of automation that spans people, process, and technology. As a leading provider of open source technologies across the infrastructure landscape,…

What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorized access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

Archive