The engine that drives millions of Okta Workflows executions each day was an early adopter of the async Rust ecosystem. While Tokio is the natural choice for an async runtime today, we launched Workflows before the release of Tokio 1.0, and well before the best practices and patterns for async Rust had really solidified.
This article details how…
How we’ve fortified security in Okta Developer Edition Service
Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…
What is Public Key Pinning?
Normally, traffic between a client application and its server-side relies on Public Key Infrastructure (PKI). While this mechanism is sufficient for most internet traffic, the Okta Secure Identity Commitment requires us to consider advanced, persistent, targeted attackers, even including nation state-level actors.
Okta…
In the dynamic field of engineering, the journey to success is often filled with thrilling highs and challenging lows. Whether it’s the exhilaration of a breakthrough, the stress of balancing demanding projects, or the pressure of an urgent hotfix, engineers face numerous obstacles.
However, with the right guidance and support, many of these…
Okta is constantly evolving our cloud infrastructure to meet the needs of our customers. We place reliability and scalability at the core of our design decisions for services that process billions of authentications per month. This article dives into how a recent project to remove one of our most heavily trafficked services yielded significant…
Identity is foundational to modern security strategy. Identity-based attacks are on the rise, and most data breaches are caused by stolen credentials. With more than 18,000 customers and an Identity platform that performs billions of authentications every month, Okta is at the frontline of most of these Identity-based attacks.
In the past month…
Image generated using DALL·E 2
This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organization’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organization’s proactive use…
Cyber attackers are constantly evolving and developing more sophisticated methods. Phishing and social engineering attacks are increasing, and as quickly as organizations implement more advanced authenticators, attackers adapt to them. One emerging strategy involves stealing session tokens directly from users' web browsers, presenting a fresh…
As software development companies race toward delivering Generally Available (GA) features, the emphasis on quality assurance (QA) becomes more critical than ever. Beyond traditional testing methodologies, diversifying testing types is paramount to ensuring the success of GA features.
At Okta, the product team is responsible for maintaining…
Self-service registration is an essential and commonly used feature for Okta customers. Okta Classic had this feature as part of the directory section in the admin settings page, and it’s available in Okta organizations (orgs) with a feature flag (SELF_SERVICE_REGISTRATION). An admin can create attributes as part of the profile in Universal…