Alexander Makarovmakarov.cloud·Oct 30, 2024How to setup Universal Logout for Salesforce and Okta ITPManaging user sessions across applications is critical to secure modern enterprise ecosystems. Okta Identity-Triggered Policies (ITP) allow you to logout users from apps such as Google Workspace, Slack, PagerDuty, Salesforce, etc. This guide takes yo...88 readsokta
Praveen Kumar Bhartipraveen-thcloudguru.hashnode.dev·Oct 30, 2024Monitoring Okta Health with AWS Canary: A Step-by-Step GuideOkta is a leading identity provider, enabling organizations to manage secure user access to applications and devices seamlessly. For organizations relying on Okta’s services, downtime or performance issues can have significant impacts. That’s where A...Cloud
Tech Shots(RoamPals)roampals.org·Sep 8, 2024SCIM User Provisioning: Streamlining Identity Management with PythonSCIM User Provisioning: Simplify Identity Management with Python Meta Description: Learn how to implement SCIM user provisioning using Python. Streamline your identity management across Azure AD, Okta, and Google Cloud with step-by-step examples and ...1 likeUser Provisioning
Monoranjan Sahuneogene.hashnode.dev·Jul 20, 2024What is Okta and What Does Okta Do?Okta connects any person with any application on any device. It's an enterprise-grade, identity management service, built for the cloud, but compatible with many on-premises applications. With Okta, IT can manage any employee's access to any applicat...okta
Monoranjan Sahuneogene.hashnode.dev·Jul 17, 2024SSO (Single Sign-On)Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO is used by organizations of all sizes and indivi...SSO
Cloud Tunedcloudtuned.hashnode.dev·Feb 29, 2024Okta Basics: Simplifying Identity Management in the CloudOkta Basics: Simplifying Identity Management in the Cloud In today's digital landscape, managing user identities and access across various applications and services can be a complex challenge for organizations. This is where Identity as a Service (ID...okta
Ray Makasiraymakasi.hashnode.dev·Jan 29, 2024Cross-tenant impersonation: Best practice tips from OktaIdentity attacks, specifically impersonation attacks, represent a significant and growing threat to organizations. Over the past couple of months, this has been well documented. Okta Security has identified a cluster of activity in which: Threat act...26 readsokta
Prudviprudvi.hashnode.dev·Jan 25, 2024What is Authentication?Authentication is important component of IAM. It’s the process of verifying identity of a user or a system. In simple words, Authentication is about confirming a user's identity by asking "is this really you"? Strategies for Implementing Authenticati...authentication
Binisha Joshibinishajoshi.hashnode.dev·Dec 11, 2023SSO configuration with AWS Redshift using OktaIn the ever-evolving landscape of cloud computing, enterprises are increasingly turning to streamlined and secure identity management solutions to enhance access control and user experience. One such powerful alliance is the integration of Single Sig...10 likes·115 readsAWS
Aguibou BarryforBlog de la société Point Basepointbaseblog.hashnode.dev·Oct 23, 2023Avec Auth0 (Okta Customer Identity Cloud), passez à l'Action !Découvrons ensemble les Actions, ces morceaux de code qui agissent comme des extensions flexibles du flux d'autorisation et d'authentification ! Avant toute chose, Auth0, c'est quoi ? Auth0 est une solution IaaS (Identity as a Service), pensée par et...62 readsIdentités & AccèsAuth0