Adeniyi Adedotun (nisun-dot)adeniyiadedotun.hashnode.dev·Sep 8, 2024SCIM User Provisioning: Streamlining Identity Management with PythonSCIM User Provisioning: Simplify Identity Management with Python Meta Description: Learn how to implement SCIM user provisioning using Python. Streamline your identity management across Azure AD, Okta, and Google Cloud with step-by-step examples and ...Discuss·1 likeUser Provisioning
Monoranjan Sahuneogene.hashnode.dev·Jul 20, 2024What is Okta and What Does Okta Do?Okta connects any person with any application on any device. It's an enterprise-grade, identity management service, built for the cloud, but compatible with many on-premises applications. With Okta, IT can manage any employee's access to any applicat...Discussokta
Monoranjan Sahuneogene.hashnode.dev·Jul 17, 2024SSO (Single Sign-On)Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO is used by organizations of all sizes and indivi...DiscussSSO
Cloud Tunedcloudtuned.hashnode.dev·Feb 29, 2024Okta Basics: Simplifying Identity Management in the CloudOkta Basics: Simplifying Identity Management in the Cloud In today's digital landscape, managing user identities and access across various applications and services can be a complex challenge for organizations. This is where Identity as a Service (ID...Discussokta
Ray Makasiraymakasi.hashnode.dev·Jan 29, 2024Cross-tenant impersonation: Best practice tips from OktaIdentity attacks, specifically impersonation attacks, represent a significant and growing threat to organizations. Over the past couple of months, this has been well documented. Okta Security has identified a cluster of activity in which: Threat act...Discussokta
Prudviprudvi.hashnode.dev·Jan 25, 2024What is Authentication?Authentication is important component of IAM. It’s the process of verifying identity of a user or a system. In simple words, Authentication is about confirming a user's identity by asking "is this really you"? Strategies for Implementing Authenticati...Discussauthentication
Binisha Joshibinishajoshi.hashnode.dev·Dec 11, 2023SSO configuration with AWS Redshift using OktaIn the ever-evolving landscape of cloud computing, enterprises are increasingly turning to streamlined and secure identity management solutions to enhance access control and user experience. One such powerful alliance is the integration of Single Sig...Discuss·10 likes·86 readsAWS
Gurarsh SinghforWonolo Engineeringengineeringblog.wonolo.com·Oct 16, 2023Importance of Automation in IT OperationsIntroduction: Running an IT team in your organization and without automation part of your operations? Learn why you should consider automating your team’s operational tasks as much as you can. Automating your organization tasks can offer a number of ...Discuss·190 readsIT
Julien NanquetteforPoint Base tech blogpointbase.hashnode.dev·Oct 10, 2023Okta API Access Management : une métaphore du Chevalier NoirRécemment, alors que je réfléchissais au sujet d’un nouvel article, mon regard s’est arrêté sur mon bureau. Comme souvent, un comic de Batman se trouvait à côté de mon écran droit (pour ceux qui se posent la question, il s’agit de “Batman Nocturne”)....DiscussIdentityokta
Julien NanquetteforPoint Base tech blogpointbase.hashnode.dev·Sep 29, 2023OKTA Workflows : le meilleur reste à venirDans mon article précédent, je vous présentais les workflows Okta de façon sommaire, afin de susciter votre curiosité quant au potentiel de cet outil. A priori, si vous êtes ici, c’est que c’est le cas ( si vous avez vu de la lumière et que vous êtes...DiscussIdentityidentity-management