We’re a year into our SCIM provisioning developer program, and we’re happy to report that many top SaaS vendors are starting to adopt the SCIM standard. As an Okta customer, that means you can automate user onboarding and offboarding across more apps than ever, saving IT time and increasing security. We’ve also added support for better group…
Readers of our blog may be familiar with the success stories our customers tell about how they’ve evolved from legacy systems to a cloud-first strategy and how the Okta Identity Cloud has helped enable transformations for their organizations. Our customers’ journeys reveal the critical role that technology plays in advancing their organizations,…
This piece is the final in a series of three blog posts on bug bounty programs and what are some considerations to think about when investing in or launching the program.
Last year, Okta announced that we launched a public bug bounty program with Bugcrowd. I’ve already written about the early considerations necessary to successfully implementing a…
Believe it or not, we’re only a few months away from our favorite three days of the year — Oktane. Come August 28, we’ll be gathering thousands of IT professionals, developers and security leaders in Las Vegas to explore the extraordinary power of you.
Before I have the honor of unveiling the most anticipated part of our Oktane agenda, I wanted to…
This piece is the second in a series of three blog posts on bug bounty programs and what are some considerations to think about when investing in or launching the program.
In my last post, I discussed the benefits of experimenting with a private bug bounty program before launching a public bounty. Today I’ll share which teams you should involve in…
The following note was sent to Okta employees this morning.
i·den·ti·ty ˌīˈden(t)ədē/ (noun) 1. the fact of being who or what a person or thing is.
We’re proud that today is Okta’s first day as a public company. It is a rare and important milestone, and we celebrate the victories and hurdles both big and small that brought us to today.
We…
This piece is the first in a series of three blog posts on bug bounty programs and what are some considerations to think about when investing in or launching the program.
Bug bounty program delivery models range from self-managed input channels for receiving vulnerabilities, platform managed private programs with a small curated list of…