Problem statement
Every product needs some measure of testing; security products need more than most. Achieving the confidence, product quality, and product safety necessary for an industry-critical solution such as Okta could be done with infinite resources, infinite money, and infinite time. Until those are available, alternative solutions are…
This recipe is part of the series Learn CIAM by example: Four recipes to improve your app’s security and UX. You can learn more about the series by downloading our four recipes in a cookbook format.
In this recipe, you learn how to add passwordless auth to your application using passkeys.
Consumers want to see and do more digitally, and they…
In literary terms, a quest is described as “an adventurous journey” taken on by a story’s main character. This journey often brings challenges, but by the end, the main character gains enhanced knowledge and experience.
What does a literary device have to do with Identity? Implementing and growing your Identity practice is no different from a…
Cyber attackers are constantly evolving and developing more sophisticated methods. Phishing and social engineering attacks are increasing, and as quickly as organizations implement more advanced authenticators, attackers adapt to them. One emerging strategy involves stealing session tokens directly from users' web browsers, presenting a fresh…
As software development companies race toward delivering Generally Available (GA) features, the emphasis on quality assurance (QA) becomes more critical than ever. Beyond traditional testing methodologies, diversifying testing types is paramount to ensuring the success of GA features.
At Okta, the product team is responsible for maintaining…
Okta, CrowdStrike, and Zscaler have joined forces to deliver an integrated, best-of-breed Zero Trust solution that provides the cross-domain and context-driven security needed to withstand today’s threats.
Beyond the Perimeter 2024, a virtual event being held on April 9, 10, and 11, provides the opportunity for you to join experts from these three…
Self-service registration is an essential and commonly used feature for Okta customers. Okta Classic had this feature as part of the directory section in the admin settings page, and it’s available in Okta organizations (orgs) with a feature flag (SELF_SERVICE_REGISTRATION). An admin can create attributes as part of the profile in Universal…
This recipe is part of the series Learn CIAM by example: Four recipes to improve your apps security and UX. You can learn more about the series by downloading our four recipes in a cookbook format.
In this recipe, you learn how to add passwordless auth to your application using passkeys.
Attack vectors are becoming more sophisticated every day,…
Active Cyber is a leading pioneer in digital transformation, partnering with top technology leaders to help turn Identity and Access Management (IAM) into a strategic strength for today’s organizations.
Over a decade of partnership, Active Cyber has delivered more than 600 Okta implementations — spanning Okta Workforce Identity Cloud and Okta…
Tech is mission critical
The pandemic was a major turning point in nonprofits’ use of technology. Remote work required organizations to quickly adopt new tools to sustain employee productivity at home and connect with those they support. In the field, services began to be delivered digitally or with more digital components — increasing ease of use…