okta.com
Independent Directory - Important Information
This llms.txt file was publicly accessible and retrieved from okta.com. LLMS Central does not claim ownership of this content and hosts it for informational purposes only to help AI systems discover and respect website policies.
This listing is not an endorsement by okta.com and they have not sponsored this page. We are an independent directory service with no affiliation to the listed domain.
Copyright & Terms: Users should respect the original terms of service of okta.com. If you believe there is a copyright or terms of service violation, please contact us at support@llmscentral.com for prompt removal. Domain owners can also claim their listing.
Current llms.txt Content
# Okta and Auth0 Platforms > The Okta and Auth0 Platforms enable secure access, authentication, and automation — putting Identity at the heart of business security and growth. ## Okta and Auth0 Platforms - [Okta and Auth0 Platforms](https://www.okta.com) — The Okta and Auth0 Platforms enable secure access, authentication, and automation — putting Identity at the heart of business security and growth. ## FAQ - [FAQ](https://www.okta.com/faq) ## Company - [Company](https://www.okta.com/company) — Discover how Okta's Customer and Workforce Identity Cloud solutions can help everyone take control of their digital presence and safely use any technology. ## Identity-101 - [Identity-101](https://www.okta.com/identity-101) — Get up to speed with Identity and Access Management topics with our Identity 101 series. ## Identity 101 Pages - [Defining Intrusion Detection Systems & How IDS Monitors Work](https://www.okta.com/identity-101/intrusion-detection-system) - [Firewall: Definition, How They Work & Why You Need One](https://www.okta.com/identity-101/firewall) - [Understanding Traffic Bots & How to Stop Them](https://www.okta.com/identity-101/traffic-bot) - [What Is a Honeynet? Definition, Usage & the Honeynet Project](https://www.okta.com/identity-101/honeynet) - [Multi-factor Authentication + VPN = Secure and Private](https://www.okta.com/identity-101/mfa-and-vpn) - [Fake Identities: Damages, Data, and Defense](https://www.okta.com/identity-101/fake-identities) - [RSA Encryption: Definition, Architecture, Benefits & Use](https://www.okta.com/identity-101/rsa-encryption) - [Universal 2nd Factor (U2F): History, Evolution, Advantages](https://www.okta.com/identity-101/u2f) - [How Does Facial Recognition Work & Is It Secure?](https://www.okta.com/identity-101/how-does-facial-recognition-work) - [The Importance of Centralized Identity Management](https://www.okta.com/identity-101/the-importance-of-centralized-identity-management) - [Take Your Security to the Next Level with Context-Based Authentication](https://www.okta.com/identity-101/context-based-authentication) - [Should You Choose U2F or Adaptive MFA?](https://www.okta.com/identity-101/u2f-or-adaptive-mfa) - [Fraggle Attack: Definition, Damage, Defense & vs. Smurf](https://www.okta.com/identity-101/fraggle-attack) - [Disaster Recovery: Planning, Strategies, Types & Procedures](https://www.okta.com/identity-101/disaster-recovery) - [Voice Passwords: Definition, Security & How They Work](https://www.okta.com/identity-101/voice-passwords) - [Network Access Control (NAC): Securing Networks by Device](https://www.okta.com/identity-101/network-access-control) - [Password Authentication Protocol (PAP) Security Explained](https://www.okta.com/identity-101/pap-security) - [IP Spoofing Unraveled: What It Is & How to Prevent It](https://www.okta.com/identity-101/ip-spoofing) - [Defining Customer Identity & Access Management (CIAM)](https://www.okta.com/identity-101/ciam) - [What Is a Fork Bomb? Definition, Code, Prevention & Removal](https://www.okta.com/identity-101/fork-bomb) - [What Is Identity Theft? Definition & Examples](https://www.okta.com/identity-101/identity-theft-definition) - [Elliptic Curve Digital Signature Algorithm (ECDSA) Defined](https://www.okta.com/identity-101/ecdsa) - [The PlusToken Cryptocurrency Scheme: Architecture and Exposure](https://www.okta.com/identity-101/plus-token) - [CSRF Attack: Cross-Site Request Forgery Definition & Defense](https://www.okta.com/identity-101/csrf-attack) - [Hashing vs. Encryption: Definitions & Differences](https://www.okta.com/identity-101/hashing-vs-encryption) - [Zero Trust framework: A comprehensive, modern security model](https://www.okta.com/identity-101/zero-trust-framework-a-comprehensive-modern-security-model) - [Tips to Better Leverage Your Active Directory](https://www.okta.com/identity-101/leverage-active-directory) - [What Is Passwordless Authentication & How Does It Work?](https://www.okta.com/identity-101/passwordless) - [Defining Hping Packet Generator as a Security Tool](https://www.okta.com/identity-101/hping) - [Cross Site Tracking: Defining Browser Tracking and Prevention](https://www.okta.com/identity-101/cross-site-tracking) - [Ethical Hacking: What It Is & Examples](https://www.okta.com/identity-101/ethical-hacking) - [What Is a Security Token (or Authentication Token) and How Does It Work?](https://www.okta.com/identity-101/security-token) - [Google Hacking (Google Dorking): Definition & Techniques](https://www.okta.com/identity-101/google-hack) - [What is the Most Secure Authentication Method for Your Organization?](https://www.okta.com/identity-101/what-is-the-most-secure-authentication-method) - [Defining PII (Personally Identifiable Information)](https://www.okta.com/identity-101/pii) - [How to Set Up Privileged Access Management](https://www.okta.com/identity-101/how-to-set-up-privileged-access-management) - [Network Vulnerabilities 101: Types and Prevention Methods](https://www.okta.com/identity-101/network-vulnerability) - [Intrusion Prevention System: What Is An IPS? How Do They Work?](https://www.okta.com/identity-101/intrusion-prevention-system) - [Dual Authentication: A Necessary Extra Layer of Security](https://www.okta.com/identity-101/dual-authentication) - [GDPR Compliant](https://www.okta.com/identity-101/gdpr-compliant) - [Why Is Cloud Security So Important?](https://www.okta.com/identity-101/why-is-cloud-security-so-important) - [Crowdfunding Scams: Common Schemes & How to Avoid Them](https://www.okta.com/identity-101/crowdfunding-scams) - [Zero Trust Implementation: Remodeling Modern Security](https://www.okta.com/identity-101/zero-trust-implementation-remodeling-modern-security) - [Defining & Understanding the MITRE ATT&CK Framework](https://www.okta.com/identity-101/mitre-attack) - [Which Industries Require Two-Factor Authentication?](https://www.okta.com/identity-101/which-industries-require-2fa) - [Defining Certificate Authority and How It Works](https://www.okta.com/identity-101/certificate-authority) - [How CIAM Solutions Help Protect Your Customers’ Data](https://www.okta.com/identity-101/ciam-solutions-protect-customer-data) - [What is PCI? Understanding the Importance of PCI Compliance](https://www.okta.com/identity-101/what-is-pci) - [Phishing prevention 101: Safeguarding your organization](https://www.okta.com/identity-101/phishing-prevention-101-safeguarding-your-organization) - [SSL Handshake (TLS Handshake) Explained](https://www.okta.com/identity-101/ssl-handshake) - [Session Hijacking Attack: Definition, Damage & Defense](https://www.okta.com/identity-101/session-hijacking) - [Authentication Protocols 101: Definition, Types, and When to Use](https://www.okta.com/identity-101/authentication-protocols) - [What Is the Ping of Death (PoD)? Definition, Damage & Defense](https://www.okta.com/identity-101/ping-of-death) - [Public Key Encryption: What Is Public Cryptography?](https://www.okta.com/identity-101/public-key-encryption) - [Privileged access management solutions: Securing critical assets](https://www.okta.com/identity-101/privileged-access-management-solutions) - [What is IDaaS? Understanding Identity as a Service and Its Applications](https://www.okta.com/identity-101/idaas) - [HMAC (Hash-Based Message Authentication Codes) Definition](https://www.okta.com/identity-101/hmac) - [IDS vs. IPS: Definitions, Comparisons & Why You Need Both](https://www.okta.com/identity-101/ids-vs-ips) - [ICMP Protocol (Internet Control Message Protocol): A Guide](https://www.okta.com/identity-101/icmp) - [Privacy, Security, Efficiency: The Benefits of a Cloud Identity Provider](https://www.okta.com/identity-101/cloud-identity) - [Fingerprint Biometrics: Definition & How Secure It Is](https://www.okta.com/identity-101/fingerprint-biometrics-definition-how-secure-it-is) - [Extended Access Control List 101: Access & Privilege](https://www.okta.com/identity-101/extended-access-control-list) - [What Is Role-Based Access Control (RBAC)?](https://www.okta.com/identity-101/what-is-role-based-access-control-rbac) - [Bad Gateway Errors: Why They Happen and 5 Solutions](https://www.okta.com/identity-101/bad-gateway) - [What Is BaaS (Backend as a Service)? Definition and Usage](https://www.okta.com/identity-101/baas-backend-as-a-service) - [Internal IP Address Defined: Purpose & Uses](https://www.okta.com/identity-101/internal-ip) - [Access Control List: Definition, Types & Usages](https://www.okta.com/identity-101/access-control-list) - [Identity Providers (IdPs): What They Are and Why You Need One](https://www.okta.com/identity-101/why-your-company-needs-an-identity-provider) - [CIAM Security](https://www.okta.com/identity-101/ciam-security) - [SOC Reports Explained: Service Organization Control Necessity](https://www.okta.com/identity-101/soc-report) - [Defining Data Profiling: Processes and Usage](https://www.okta.com/identity-101/data-profiling) - [SQL Injection: Definition, Damage & Defense](https://www.okta.com/identity-101/sql-injection-attack) - [Defining Buffer Overflow Attacks & How to Defend Against Them](https://www.okta.com/identity-101/buffer-overflow-attacks) - [Wannacry Ransomware Attack: Definition, Damage & Defense](https://www.okta.com/identity-101/wannacry) - [User Access Management Basics](https://www.okta.com/identity-101/user-access-management) - [Biometric Data: Definition and Security Concerns](https://www.okta.com/identity-101/biometric-data) - [Tokenization Explained: What Is Tokenization & Why Use It?](https://www.okta.com/identity-101/tokenization) - [What Is Identity Management and Access Control?](https://www.okta.com/identity-101/what-is-identity-management-and-access-control) - [What Is Corporate Account Takeover and How Do We Prevent It?](https://www.okta.com/identity-101/what-is-corporate-account-takeover) - [Identification & Authentication: Similarities & Differences](https://www.okta.com/identity-101/identification-vs-authentication) - [Remote Desktop Services (RDS): Security Benefits and Uses](https://www.okta.com/identity-101/remote-desktop-services) - [Address Resolution Protocol (ARP): What It Is and How It Works](https://www.okta.com/identity-101/address-resolution-protocol-arp) - [Phone Security Best Practices to Protect Your Mobile Data](https://www.okta.com/identity-101/phone-security) - [Enterprise SSO: Balancing convenience with uncompromised security](https://www.okta.com/identity-101/enterprise-sso) - [Identity Fabric: The future of Identity and access management](https://www.okta.com/identity-101/identity-fabric-the-future-of-identity-and-access-management) - [Data Integrity: Definition, Importance & Security Impacts](https://www.okta.com/identity-101/data-integrity) - [SASE: Secure Access Service Edge Defined](https://www.okta.com/identity-101/secure-access-service-edge-sase) - [What Is a DNS PTR Record & What Is It Used For?](https://www.okta.com/identity-101/ptr-record) - [Scareware: Definition, Identification & Prevention](https://www.okta.com/identity-101/scareware) - [What is a multicloud management platform?](https://www.okta.com/identity-101/multicloud-management-platform) - [What is secure remote access? Definitions and uses](https://www.okta.com/identity-101/secure-remote-access) - [What is SIEM? Security Information & Event Management 101](https://www.okta.com/identity-101/siem) - [3 Common Mistakes That Lead to a Security Breach](https://www.okta.com/identity-101/mistakes-that-lead-to-security-breach) - [Security compliance: Regulations, best practices, and strategies](https://www.okta.com/identity-101/security-compliance) - [Understanding Zero Trust application access (ZTAA)](https://www.okta.com/identity-101/zero-trust-application-access) - [Coronavirus Malware: Cyber Threats Rising](https://www.okta.com/identity-101/coronavirus-malware) - [WiFi Authentication Errors and Methods to Solve Them](https://www.okta.com/identity-101/authentication-error) - [What Is Token-Based Authentication?](https://www.okta.com/identity-101/what-is-token-based-authentication) - [Strong customer authentication: Securing digital transactions](https://www.okta.com/identity-101/strong-customer-authentication) - [WPA3 Security: Benefits, Vulnerabilities & Comparison to WPA2](https://www.okta.com/identity-101/wpa3-security) - [10 Signs of Identity Theft to Watch Out For](https://www.okta.com/identity-101/signs-of-identity-theft) - [SOC 1 Business Process: Control, Audits, & Compliance](https://www.okta.com/identity-101/soc-1) - [RAT (Remote Access Trojan) Software Attacks Defined](https://www.okta.com/identity-101/remote-access-trojan-rat) - [Cybersecurity mesh: securing every device and access point](https://www.okta.com/identity-101/cybersecurity-mesh) - [LDAP vs. Active Directory: What's the Difference?](https://www.okta.com/identity-101/ldap-vs-active-directory) - [Automated provisioning: Secure, efficient user access management](https://www.okta.com/identity-101/automated-provisioning) - [Video Verification: Definition, Technology, Risks & Benefits](https://www.okta.com/identity-101/video-verification-definition-technology-risks-benefits) - [Understanding Adaptive Authentication and How It Works](https://www.okta.com/identity-101/adaptive-authentication) - [Alphanumeric Characters and Alphanumeric Password Requirements](https://www.okta.com/identity-101/alphanumeric-characters-password) - [PEAP (Protected Extensible Authentication Protocol)](https://www.okta.com/identity-101/peap) - [What is Enhanced Due Diligence? Definition & Procedures](https://www.okta.com/identity-101/enhanced-due-diligence) - [Ping Trace Techniques for Network Connectivity Troubleshooting](https://www.okta.com/identity-101/ping-trace) - [What is MD5? Understanding Message-Digest Algorithms](https://www.okta.com/identity-101/md5) - [How Legacy Apps Are Moving to the Cloud: Office 365](https://www.okta.com/identity-101/cloud-microsoft-office-365) - [Replay Attack: Process, Impacts, and Defense](https://www.okta.com/identity-101/replay-attack) - [Authentication Server: Definition, Architecture & Operations](https://www.okta.com/identity-101/authentication-server) - [Social Engineering: How It Works, Examples & Prevention](https://www.okta.com/identity-101/social-engineering) - [Web Authentication: How Is Web API Basic Authentication Used?](https://www.okta.com/identity-101/web-authentication) - [Penetration Testing: What Is It & Why Is Pentesting Required?](https://www.okta.com/identity-101/penetration-testing) - [Identity resolution: The key to accurate, unified user profiles](https://www.okta.com/identity-101/identity-resolution) - [Defining Cloud Computing: Systems, Architecture, and Uses](https://www.okta.com/identity-101/cloud-computing) - [Understanding the California Consumer Privacy Act (CCPA)](https://www.okta.com/identity-101/ccpa) - [Entitlement Management Identity Governance Explained](https://www.okta.com/identity-101/entitlement-management-identity-governance-explained) - [Multi-Tenancy Cloud: Definition, Security & Benefits](https://www.okta.com/identity-101/multi-tenancy-cloud) - [SOC 1 vs. SOC 2: Differences, Execution, and Legalities](https://www.okta.com/identity-101/soc-1-vs-soc-2) - [What’s the Difference Between OAuth, OpenID Connect, and SAML?](https://www.okta.com/identity-101/whats-the-difference-between-oauth-openid-connect-and-saml) - [SSL Offloading 101: Definition, Processes & Objectives](https://www.okta.com/identity-101/ssl-offloading) - [Low Orbit Ion Cannon (LOIC): Definition, Damage & Defense](https://www.okta.com/identity-101/low-orbit-ion-cannon-loic) - [Security as a Service (SECaaS): Advantages & Services](https://www.okta.com/identity-101/security-as-a-service-secaas) - [What Is Access Control & How Crucial Is It to Cybersecurity?](https://www.okta.com/identity-101/access-control) - [SAML vs. OAuth: Comparison and Differences](https://www.okta.com/identity-101/saml-vs-oauth) - [Biometrics: Secure Authentication in the Modern Age](https://www.okta.com/identity-101/biometrics-secure-authentication) - [Password vs. Passphrase: Differences & Which Is Better?](https://www.okta.com/identity-101/password-vs-passphrase) - [End-to-End Encryption (E2EE): Definition & Examples](https://www.okta.com/identity-101/end-to-end-encryption) - [Cloud Identity and Access Management: Security transformed](https://www.okta.com/identity-101/cloud-identity-and-access-management) - [What is Authentication? Methods, Importance, & Processes](https://www.okta.com/identity-101/authentication) - [CIAM Architecture: Powering secure, seamless customer experiences](https://www.okta.com/identity-101/ciam-architecture) - [Bot Management Definition, Strategies & Best Practices](https://www.okta.com/identity-101/bot-management) - [What Is Cryptography? Definition & How It Works](https://www.okta.com/identity-101/cryptography) - [Fault Tolerance: Definition, Testing & Importance](https://www.okta.com/identity-101/fault-tolerance) - [Strong Authentication: Definition & Security Factors](https://www.okta.com/identity-101/what-is-strong-authentication) - [Private Cloud: Definition, Architecture, Benefits, and Limits](https://www.okta.com/identity-101/private-cloud) - [What are Behavioral Biometrics? Types & Technology](https://www.okta.com/identity-101/behavioral-biometrics) - [GRC Tools and Platforms for 2022](https://www.okta.com/identity-101/grc-tools) - [Risk-Based Authentication: What You Need to Consider](https://www.okta.com/identity-101/risk-based-authentication) - [Password Encryption: How Do Password Encryption Methods Work?](https://www.okta.com/identity-101/password-encryption) - [One-Way Hash Function: Dynamic Algorithms](https://www.okta.com/identity-101/one-way-hash-function) - [One-Way Hash Function: Dynamic Algorithms](https://www.okta.com/identity-101/one-way-hash-function-dynamic-algorithms) - [Identity and access management best practices for enhanced security](https://www.okta.com/identity-101/identity-and-access-management-best-practices-for-enhanced-security) - [How Okta Helps Automate User Provisioning for Active Directory](https://www.okta.com/identity-101/automate-user-provisioning-for-active-directory) - [4 Key Things You Should Know About Access Governance](https://www.okta.com/identity-101/4-things-you-should-know-about-access-governance) - [IT modernization: Balancing security and user experience](https://www.okta.com/identity-101/it-modernization) - [Credential Stuffing: Definition, Techniques & Defense ](https://www.okta.com/identity-101/credential-stuffing) - [Identity and Access Management Solutions: Balancing Security and UX](https://www.okta.com/identity-101/identity-and-access-management-solutions) - [What is Identity Security?](https://www.okta.com/identity-101/what-is-identity-security) - [What Is a Systems Administrator & What Do They Do?](https://www.okta.com/identity-101/system-administrator) - [Clickjacking: Definition, Defense & Prevention](https://www.okta.com/identity-101/clickjacking) - [What is a Network Access Server?](https://www.okta.com/identity-101/what-is-a-network-access-server) - [Central Authentication Service (CAS) Protocol Explained](https://www.okta.com/identity-101/central-authentication-service) - [Anonymous IP Browsing: Types, Risks, and Detection](https://www.okta.com/identity-101/anonymous-ip) - [CAPTCHA: Meaning, Types & How They Work](https://www.okta.com/identity-101/captcha) - [Single Sign-On: The Difference Between ADFS vs. LDAP](https://www.okta.com/identity-101/single-sign-on-adfs-vs-ldap) - [Macro Virus: Definition, Operation, Prevention & Removal](https://www.okta.com/identity-101/macro-virus) - [Tactics to Avoid Password Leaks](https://www.okta.com/identity-101/password-leak) - [Authentication vs. Authorization](https://www.okta.com/identity-101/authentication-vs-authorization) - [Brute force attacks: Understanding, types, and prevention](https://www.okta.com/identity-101/brute-force) - [RBAC vs. ABAC: Definitions & When to Use](https://www.okta.com/identity-101/role-based-access-control-vs-attribute-based-access-control) - [SOC 2 Type 2 for Service Organizations: Fairness and Trust](https://www.okta.com/identity-101/soc-2-type-2) - [6 Password Hacker Tools and Protecting Against Them](https://www.okta.com/identity-101/password-hacker) - [Defining DLP (Data Loss Prevention) & Exploring How it Works](https://www.okta.com/identity-101/data-loss-prevention) - [What Is Least Privilege Access—and Why Do You Need It?](https://www.okta.com/identity-101/what-is-least-privilege-access) - [Wired Equivalent Privacy (WEP): Definition & Risks](https://www.okta.com/identity-101/wep) - [HTTP Error 431: Definition, Status, Causes & Solutions](https://www.okta.com/identity-101/http-error-431) - [SMS Gateway: Definition, Uses, and How They Work](https://www.okta.com/identity-101/sms-gateway) - [Cyber Hygiene: Definition & Best Practices](https://www.okta.com/identity-101/cyber-hygiene) - [WiFi Pineapple Definition & Pineapple Router Uses](https://www.okta.com/identity-101/wifi-pineapple) - [PAN (Personal Area Network) Definition & Overview](https://www.okta.com/identity-101/personal-area-network-pan) - [What Is a Virtual Machine? Definition & Guide](https://www.okta.com/identity-101/virtual-machines) - [Reverse Proxy: What Is a Reverse Proxy and Why Use One?](https://www.okta.com/identity-101/reverse-proxy) - [DDoS Attack: A guide to distributed denial-of-service attacks](https://www.okta.com/identity-101/ddos-attack) - [Biometric Passport: Security, Data Protection & How They Work](https://www.okta.com/identity-101/biometric-passport) - [Secrets Management: Tools & Methods for Authentication](https://www.okta.com/identity-101/secrets-management) - [XSS Vulnerability 101: Identify and Stop Cross-Site Scripting](https://www.okta.com/identity-101/xss-vulnerability) - [What Is Hybrid Cloud Architecture and How Can We Use It?](https://www.okta.com/identity-101/what-is-hybrid-cloud-architecture) - [What Is the Cloud? Defining Remote Internet Infrastructures](https://www.okta.com/identity-101/what-is-the-cloud) - [Understanding Proxy Servers and How They Work](https://www.okta.com/identity-101/proxy-server) - [Insider Threat: Definition, Prevention & Defense](https://www.okta.com/identity-101/insider-threat) - [Rooted Devices: Definition, Benefits & Security Risks](https://www.okta.com/identity-101/rooted-device) - [Access Token: Definition, Architecture, Usage & More](https://www.okta.com/identity-101/access-token) - [Augmented Intelligence (AI): The Future of Cognitive Security](https://www.okta.com/identity-101/augmented-intelligence) - [Identity and Access Management (IAM) Overview](https://www.okta.com/identity-101/identity-and-access-management) - [What Is Federated Identity?](https://www.okta.com/identity-101/what-is-federated-identity) - [Honeypots: Definition & Role in Cybersecurity Testing](https://www.okta.com/identity-101/honeypots) - [Virtual Hosting: Types, Architecture, Uses & Benefits](https://www.okta.com/identity-101/virtual-host) - [What Is Authorization? Comparison with Access Control](https://www.okta.com/identity-101/authorization) - [Generic Routing Encapsulation (GRE) Tunnel Defined](https://www.okta.com/identity-101/gre-tunnel) - [Customer Identification Program (CIP): Definition & Guidelines](https://www.okta.com/identity-101/cip-banking) - [LEI (Legal Entity Identifier): Creation, Usage & Benefits](https://www.okta.com/identity-101/lei) - [HLS Streaming: Definition, Usage, Pros & Cons](https://www.okta.com/identity-101/hls-streaming) - [What Is Application Security & Why Is It Essential?](https://www.okta.com/identity-101/application-security) - [Steganography: What Is It & How Does It Work?](https://www.okta.com/identity-101/steganography) - [Server Name Indication (SNI): Definition & Usage](https://www.okta.com/identity-101/sni) - [OSI Layers: Understanding the OSI Model & Its 7 Layers](https://www.okta.com/identity-101/osi-layers) - [Emotet Malware: Definition, Damage, Defense & Prevention](https://www.okta.com/identity-101/emotet) - [Evil Twin Attack: Fake WiFi Access Point Vulnerabilities](https://www.okta.com/identity-101/evil-twin-attack) - [What Is Cached Data? Why & How Should You Clear It?](https://www.okta.com/identity-101/cached-data) - [Understanding Lifecycle Management and Regulatory Compliance](https://www.okta.com/identity-101/lifecycle-management-and-regulatory-compliance) - [Black-Box Testing: Definition, Types & Techniques](https://www.okta.com/identity-101/black-box-testing) - [Slowloris DDoS Attack: Definition, Damage & Defense](https://www.okta.com/identity-101/slowloris) - [How to Start Investing in Identity and Access Management](https://www.okta.com/identity-101/invest-in-identity-and-access-management) - [What Is Public Key Infrastructure (PKI) & How Does It Work?](https://www.okta.com/identity-101/public-key-infrastructure) - [Medical Identity Theft: Defense & Prevention Measures](https://www.okta.com/identity-101/prescription-identity) - [Correlation ID: Definition, Functionality and Uses](https://www.okta.com/identity-101/correlation-id) - [MX Record: Definition, Usage & Protections](https://www.okta.com/identity-101/mx-record) - [How Identity and Access Management Quietly Powers Your Company](https://www.okta.com/identity-101/iam-powers-your-company) - [Understanding the Process of Identity Authentication](https://www.okta.com/identity-101/identity-authentication) - [CISSP: Certified Information Systems Security Professional](https://www.okta.com/identity-101/cissp) - [Server-Side Request Forgery (SSRF): Definition & Defense](https://www.okta.com/identity-101/ssrf) - [What Is Round Trip Time? Overview, Formula & Usage](https://www.okta.com/identity-101/round-trip-time-rtt) - [What Is a DNS SOA Record & What Is It Used For?](https://www.okta.com/identity-101/soa-record) - [Digital Onboarding: Definition, Benefits & How It Works](https://www.okta.com/identity-101/digital-onboarding-definition-benefits-how-it-works) - [IP Stresser (IP Booter) Definition & Uses](https://www.okta.com/identity-101/stresser) - [Serverless Computing: Uses, Advantages, and Disadvantages](https://www.okta.com/identity-101/serverless-computing) - [Principle of Least Privilege: Definition, Methods & Examples](https://www.okta.com/identity-101/minimum-access-policy) - [Advanced Persistent Threat: Definition, Lifecycle & Defense](https://www.okta.com/identity-101/advanced-persistent-threat-apt) - [Time to Live (TTL): Meaning, Purpose & Usage](https://www.okta.com/identity-101/ttl) - [Fraud Prevention: Definition & How It Works](https://www.okta.com/identity-101/fraud-detection) - [What Does a CISO (Chief Information Security Officer) Do?](https://www.okta.com/identity-101/ciso) - [What Is MyDoom Malware? History, How It Works & Defense](https://www.okta.com/identity-101/mydoom) - [Malvertising: Definition, Techniques & Defense](https://www.okta.com/identity-101/malvertising) - [RC4 Encryption Algorithm Stream Ciphers Defined](https://www.okta.com/identity-101/rc4-stream-cipher) - [Data in Motion: How to Protect Information in Transit](https://www.okta.com/identity-101/data-in-motion) - [Federated Identity Management vs. Single Sign-On: What’s the Difference?](https://www.okta.com/identity-101/federated-identity-vs-sso) - [Build a Strategy for Password Management](https://www.okta.com/identity-101/strategy-for-password-management) - [What Is Cybersecurity? Definition, Threats & More](https://www.okta.com/identity-101/cybersecurity) - [Data Transfer Object DTO Definition and Usage](https://www.okta.com/identity-101/dto) - [Understanding Private IP Ranges, Uses, Benefits, and Warnings](https://www.okta.com/identity-101/understanding-private-ip-ranges) - [DNS Over HTTPS: Remote DNS Resolutions by HTTPS Protocol](https://www.okta.com/identity-101/dns-over-https) - [What Is the Morris Worm? History and Modern Impact](https://www.okta.com/identity-101/morris-worm) - [Fake Employment Verification: Techniques & Defenses](https://www.okta.com/identity-101/fake-employment-verification) - [DMZ Network: What Is a DMZ & How Does It Work?](https://www.okta.com/identity-101/dmz) - [Building Zero Trust Networks: Securing the Perimeter](https://www.okta.com/identity-101/building-zero-trust-networks) - [Account Takeover Fraud: Definition and Defenses](https://www.okta.com/identity-101/account-takeover-fraud) - [SD-Wan: Defining a Software-Defined Wide Area Network](https://www.okta.com/identity-101/sd-wan) - [DNS Poisoning (DNS Spoofing): Definition, Technique & Defense](https://www.okta.com/identity-101/dns-poisoning) - [What Is a Botnet? Definition, How They Work & Defense](https://www.okta.com/identity-101/botnet) - [Synthetic Identity Theft: Definition, Damages & Defense](https://www.okta.com/identity-101/synthetic-identity-theft) - [What Is a VPN & How Does It Work?](https://www.okta.com/identity-101/what-is-a-vpn) - [Zoom Vulnerability: Definition & Defense Techniques](https://www.okta.com/identity-101/zoom-vulnerability) - [Origin Servers: Definition, Usage & Edge Server Comparison](https://www.okta.com/identity-101/origin-servers) - [Cloud Computing Security: Your Comprehensive Guide](https://www.okta.com/identity-101/cloud-computing-security) - [What's an Attack Vector? Definition, Common Exploits, & Protection](https://www.okta.com/identity-101/attack-vector) - [Information Classification: Definition & Internal Development](https://www.okta.com/identity-101/information-classification) - [DLL Hijacking Definition Tutorial & Prevention](https://www.okta.com/identity-101/dll-hijacking) - [MAN: Definition & How It Compares to a LAN](https://www.okta.com/identity-101/man-network) - [Social Engineering Attacks: Definition, Methods & Prevention](https://www.okta.com/identity-101/social-engineering-attacks) - [HTTP vs. HTTPS: Definition, Comparison & Security Implications](https://www.okta.com/identity-101/http-vs-https) - [Customer Due Diligence (CDD) Process Defined](https://www.okta.com/identity-101/what-is-customer-due-diligence) - [Bring Your Own Device (BYOD) Policy Best Practices](https://www.okta.com/identity-101/byod-policy) - [API Management: Publishing, Policies, and Access Control](https://www.okta.com/identity-101/api-management) - [What Is a Cryptographic Nonce? Definition & Meaning](https://www.okta.com/identity-101/nonce) - [What is an Attack Surface? (And How to Reduce It)](https://www.okta.com/identity-101/what-is-an-attack-surface) - [How Identity Governance Protects Your Business](https://www.okta.com/identity-101/how-identity-governance-protects-your-business) - [Hashing Algorithm Overview: Types, Methodologies & Usage](https://www.okta.com/identity-101/hashing-algorithms) - [Man-in-the-Browser Attack (MITB): Definition & Defense](https://www.okta.com/identity-101/man-in-the-browser) - [What Is a Teardrop Attack? Definition, Damage & Defense](https://www.okta.com/identity-101/teardrop-attack) - [Security Through Obscurity (STO): History, Criticism & Risks](https://www.okta.com/identity-101/security-through-obscurity) - [What Is Deep Packet Inspection (DPI)? Definition & Usage](https://www.okta.com/identity-101/deep-packet-inspection) - [Ransomware Defined: How Does It Work & How to Prevent It](https://www.okta.com/identity-101/ransomware) - [What Is a Digital Certificate? Definition & Examples](https://www.okta.com/identity-101/digital-certificate) - [Setting Up IAM: Managing Permissions to Ensure Compliance](https://www.okta.com/identity-101/iam-compliance) - [Digital Signatures: What They Are & How They Work](https://www.okta.com/identity-101/digital-signature) - [Defining SYN Flood DDoS Attacks: Definition, Damage & Defense](https://www.okta.com/identity-101/syn-flood) - [WFH Cybersecurity Guide for Employers and Employees](https://www.okta.com/identity-101/work-from-home-security) - [Sniffing Attack: Definition, Defense & Prevention](https://www.okta.com/identity-101/sniffing-attack) - [What are Web Application Firewalls? Definition & Usage](https://www.okta.com/identity-101/waf) - [How to Choose Your SSO Strategy](https://www.okta.com/identity-101/sso-strategy) - [What is Threat Intelligence? Mechanisms & Implications](https://www.okta.com/identity-101/threat-intelligence) - [SPF Record Checks: How to Check SPF Records and Why You Should](https://www.okta.com/identity-101/spf-record-check) - [Warrant Canary: Definition, Evolution & Impacts](https://www.okta.com/identity-101/warrant-canary) - [Security Hacker: History, Types, Exploits, and Benefits](https://www.okta.com/identity-101/security-hacker) - [Scale Securely: Establishing Universal Directory Policies](https://www.okta.com/identity-101/establishing-directory-policies) - [Identity Verification Defined and How Does It Work](https://www.okta.com/identity-101/identity-verification) - [Managing the User Lifecycle: Device Provisioning Made Easy](https://www.okta.com/identity-101/user-lifecycle-device-provisioning) - [Self-Sovereign Identity (SSI): Autonomous Identity Management](https://www.okta.com/identity-101/self-sovereign-identity) - [Fraud Monitoring: Definition, Importance & Defenses](https://www.okta.com/identity-101/fraud-monitoring) - [ARP Poisoning: Definition, Techniques, Defense & Prevention](https://www.okta.com/identity-101/arp-poisoning) - [What Is a Keylogger and How Can You Protect Yourself From One?](https://www.okta.com/identity-101/keylogger) - [What Is Latency? Definition, Impact & How to Reduce](https://www.okta.com/identity-101/latency) - [Data Exfiltration: Definition, Damage & Defense](https://www.okta.com/identity-101/data-exfiltration) - [What Is GPS Spoofing and How Do You Defend Against It?](https://www.okta.com/identity-101/gps-spoofing) - [What Is LDAP & How Does It Work?](https://www.okta.com/identity-101/what-is-ldap) - [What Is Edge Computing & Why Does it Matter?](https://www.okta.com/identity-101/edge-computing) - [Password Entropy: The Value of Unpredictable Passwords](https://www.okta.com/identity-101/password-entropy) - [What Is Transport Layer Security & How Does It Work?](https://www.okta.com/identity-101/tls-protocol) - [Understanding the Metasploit Project and Why It's Useful](https://www.okta.com/identity-101/metasploit) - [Stream Cipher 101: Definition, Usage & Comparisons](https://www.okta.com/identity-101/stream-cipher) - [The Changing Landscape of Enterprise Identity Management](https://www.okta.com/identity-101/the-changing-landscape-of-enterprise-identity-management) - [Identity Theft Protection: How It Works & Do You Need It?](https://www.okta.com/identity-101/identity-theft-protection) - [What Is MTU (Maximum Transmission Unit)?](https://www.okta.com/identity-101/mtu) - [Cybersecurity Work From Home Tips for Businesses and Employees](https://www.okta.com/identity-101/cyber-security-work-from-home) - [What Is SaaS? Defining Software as a Service](https://www.okta.com/identity-101/saas) - [Age Verification System: Definition, Processes, and Usage](https://www.okta.com/identity-101/age-verification-system) - [Script Kiddies and Skiddies: Identifying Unskilled Hackers](https://www.okta.com/identity-101/script-kiddie) - [Digital Rights Management (DRM): Access Control Tech Defined](https://www.okta.com/identity-101/digital-rights-management-drm-access-control-tech-defined) - [What Is Data Scraping? Definition & Usage](https://www.okta.com/identity-101/data-scraping) - [How To Plan a Successful Cloud Migration Strategy](https://www.okta.com/identity-101/plan-a-successful-migration-strategy) - [What is a zero-day exploit?](https://www.okta.com/identity-101/what-is-zero-day-exploit) - [Privacy vs. Security: Exploring the Differences & Relationship](https://www.okta.com/identity-101/privacy-vs-security) - [What Is a Spam Bot? Definition & Defenses](https://www.okta.com/identity-101/spam-bot) - [Arbitrary Code Execution (ACE): Definition & Defense](https://www.okta.com/identity-101/arbitrary-code-execution) - [What Is an SDK? Software Development Kits Explained](https://www.okta.com/identity-101/what-is-an-sdk) - [Cyber Kill Chain: Definition and Steps](https://www.okta.com/identity-101/cyber-kill-chain) - [What Is a Smurf Attack? Definition & Defense](https://www.okta.com/identity-101/smurf-attack) - [What Is Middleware? Definition, Guide & Examples](https://www.okta.com/identity-101/middleware) - [What is UEBA (user and entity behavior analytics)?](https://www.okta.com/identity-101/ueba) - [Malicious Code: Types, Dangers, and Defenses](https://www.okta.com/identity-101/malicious-code) - [The KYC Verification Process: 3 Steps to Compliance](https://www.okta.com/identity-101/kyc-verification) - [RFID Blocking: Definition, How It Works & Why You Need It](https://www.okta.com/identity-101/rfid-blocking) - [What to Look for When Choosing a Single Sign-On Solution](https://www.okta.com/identity-101/single-sign-on-solution) - [Understanding Digital Identity & How It Works](https://www.okta.com/identity-101/digital-identity) - [Cloud-Native Architecture: A Guide, Definitions, Types & More](https://www.okta.com/identity-101/what-is-cloud-native-architecture) - [KYC (Know Your Customer) Definition, Guidelines & Regulations](https://www.okta.com/identity-101/kyc) - [The Rising Importance of Identity Proofing](https://www.okta.com/identity-101/identity-proofing) - [Why Multi-Factor Authentication (MFA) Is Important](https://www.okta.com/identity-101/why-mfa-is-everywhere) - [What Is 1.1.1.1 & Does It Really Make Your Internet Safer?](https://www.okta.com/identity-101/1-1-1-1) - [Fine-grained access control (FGAC): Precision data security](https://www.okta.com/identity-101/fine-grained-access-control) - [Asymmetric Encryption: Definition, Architecture, Usage](https://www.okta.com/identity-101/asymmetric-encryption) - [How Secure Is a VPN & Should You Still Use One?](https://www.okta.com/identity-101/how-secure-is-a-vpn) - [Mirai Botnet Malware: Definition, Impacts & Evolution](https://www.okta.com/identity-101/mirai-botnet) - [PGP: Defining Pretty Good Privacy & How PGP Encryption Works](https://www.okta.com/identity-101/pgp-pretty-good-privacy) - [What is Agentic AI](https://www.okta.com/identity-101/what-is-agentic-ai) - [What is API Security](https://www.okta.com/identity-101/what-is-api-security) - [Threat Hunting](https://www.okta.com/identity-101/threat-hunting) - [Agentic AI Governance and Compliance](https://www.okta.com/identity-101/agentic-ai-governance-and-compliance) - [Agentic AI Security Threats](https://www.okta.com/identity-101/agentic-ai-security-threats) - [What are Non Human Identities](https://www.okta.com/identity-101/what-are-non-human-identities) - [What is non-human identity security](https://www.okta.com/identity-101/what-is-non-human-identity-security) - [AI Agent Lifecycle Management](https://www.okta.com/identity-101/ai-agent-lifecycle-management) ## Products - [Products](https://www.okta.com/products) - [Single Sign-On (CIC)](https://www.okta.com/products/single-sign-on-customer-identity) - [User Management (CIC)](https://www.okta.com/products/user-management-customer-identity) - [Organizations](https://www.okta.com/products/organizations) - [FastPass](https://www.okta.com/products/fastpass) - [Workflows](https://www.okta.com/products/workflows) - [Access Gateway](https://www.okta.com/products/access-gateway) - [Adaptive MFA](https://www.okta.com/products/adaptive-multi-factor-authentication) - [Breached Password Detection](https://www.okta.com/products/breached-passwords) - [Login Security](https://www.okta.com/products/login-security) - [User Management](https://www.okta.com/products/user-management) - [User Authentication](https://www.okta.com/products/authentication) - [Advanced Server Access](https://www.okta.com/products/advanced-server-access) - [Universal Login](https://www.okta.com/products/universal-login) - [Actions (CIC)](https://www.okta.com/products/actions) - [Access Management](https://www.okta.com/products/access-management) - [Authentication (CIC)](https://www.okta.com/products/authentication-customer-identity) - [Cloud Deployment](https://www.okta.com/products/cloud-deployment) - [Extensibility](https://www.okta.com/products/extensibility) - [Passwordless Authentication](https://www.okta.com/products/passwordless) - [Machine to Machine](https://www.okta.com/products/machine-to-machine) - [Multi-Factor Authentication](https://www.okta.com/products/multi-factor-authentication) - [Highly Regulated Identity](https://www.okta.com/products/regulated-identity) - [API Access Management](https://www.okta.com/products/api-access-management) - [B2B Integration](https://www.okta.com/products/b2b-integration) - [Device Access](https://www.okta.com/products/device-access) - [Identity Governance](https://www.okta.com/products/identity-governance) - [Identity Threat Protection](https://www.okta.com/products/identity-threat-protection) - [Lifecycle Management](https://www.okta.com/products/lifecycle-management) - [Okta AI](https://www.okta.com/products/okta-ai) - [Privileged Access](https://www.okta.com/products/privileged-access) - [Release Overview](https://www.okta.com/products/release-overview) - [Secure Partner Access](https://www.okta.com/products/secure-partner-access) - [Single Sign-On](https://www.okta.com/products/single-sign-on-workforce-identity) - [Universal Directory](https://www.okta.com/products/universal-directory) - [Forms (CIC)](https://www.okta.com/products/forms) - [Forms (CIC)](https://www.okta.com/products/forms-for-actions) - [Mergers and Acquisitions](https://www.okta.com/products/mergers-and-acquisitions) - [[REDIRECTED] Global 2000](https://www.okta.com/products/global-2000) - [Okta Customer Identity](https://www.okta.com/products/okta-customer-identity) - [Auth0 Platform](https://www.okta.com/products/customer-identity) - [Okta Workforce Identity](https://www.okta.com/products/workforce-identity) - [Identity Security Posture Management](https://www.okta.com/products/identity-security-posture-management) - [Release Overview](https://www.okta.com/products/release-overview-workforce-identity) - [Okta Personal](https://www.okta.com/products/okta-personal) ## Blog - [Blog](https://www.okta.com/blog) — At the Okta Blog, you can view stories, insights, and advice that transform the way organizations secure identity in a way that only Okta can. ## Blog Category Pages - [Author](https://www.okta.com/blog/author) - [Topic](https://www.okta.com/blog/topic) - [Identity Security | Blog](https://www.okta.com/blog/identity-security) - [Product Innovation | Blog](https://www.okta.com/blog/product-innovation) - [Industry Insights | Blog](https://www.okta.com/blog/industry-insights) - [Company & Culture | Blog](https://www.okta.com/blog/company-and-culture) - [Customers & Partners | Blog](https://www.okta.com/blog/customers-and-partners) - [AI | Blog](https://www.okta.com/blog/ai) ## Blog Posts - [Tools for detecting and responding to potential threats post authentication](https://www.okta.com/blog/identity-security/tools-for-detecting-and-responding-to-potential-threats-post-authentication) - [What Is Spear Phishing?](https://www.okta.com/blog/identity-security/what-is-spear-phishing) - [Uncovering the power of passkeys and their resilience against phishing](https://www.okta.com/blog/identity-security/uncovering-the-power-of-passkeys-and-their-resilience-against-phishing) - [What Is single sign-on (SSO)?](https://www.okta.com/blog/identity-security/single-sign-on-sso) - [Secure your application through the SURF Security browser and Okta](https://www.okta.com/blog/identity-security/secure-your-application-through-the-surf-security-browser-and-okta) - [Outsmart impersonators with Identity verification built into the Okta Platform](https://www.okta.com/blog/identity-security/outsmart-impersonators-with-identity-verification-built-into-the-okta-platform) - [The Path to Continuous Authentication: Solving the Best of Breed Problem](https://www.okta.com/blog/identity-security/the-path-to-continuous-authentication-solving-the-best-of-breed-problem) - [What Is CIAM and why does it matter?](https://www.okta.com/blog/identity-security/what-is-ciam-why-does-it-matter) - [We’ve gone 100% passwordless for workforce apps](https://www.okta.com/blog/identity-security/weve-gone-100-passwordless-for-workforce-apps) - [What is ADFS?](https://www.okta.com/blog/identity-security/what-is-adfs) - [What is a One-Time Password (OTP)?](https://www.okta.com/blog/identity-security/what-is-a-one-time-password-otp) - [Top 5 ways Identity Governance Strengthens your Security](https://www.okta.com/blog/identity-security/top-5-ways-identity-governance-strengthens-your-security) - [What Is SAML and How Does It Work?](https://www.okta.com/blog/identity-security/what-is-saml) - [Why we’re going 100% passwordless at Okta](https://www.okta.com/blog/identity-security/why-were-going-passwordless-at-okta) - [Tools for strengthening your Identity posture before authentication](https://www.okta.com/blog/identity-security/tools-for-strengthening-your-identity-posture-before-authentication) - [What Is an Identity platform?](https://www.okta.com/blog/identity-security/what-is-an-identity-platform) - [Why You Should Ditch SMS as an Auth Factor](https://www.okta.com/blog/identity-security/why-you-should-ditch-sms-as-an-auth-factor) - [What Is Two-Factor Authentication (2FA)? ](https://www.okta.com/blog/identity-security/what-is-two-factor-authentication-2fa) - [Meet the Experts: Solving for Compliance Needs with IAM](https://www.okta.com/blog/identity-security/solving-for-compliance-needs-with-iam) - [Decentralized Identity: The future of digital Identity management](https://www.okta.com/blog/identity-security/what-is-decentralized-identity) - [What Is Identity and Access Management (IAM)?](https://www.okta.com/blog/identity-security/what-is-identity-and-access-management-iam) - [Tools for enforcing authentication policy](https://www.okta.com/blog/identity-security/tools-for-enforcing-authentication-policy) - [What is SCIM?](https://www.okta.com/blog/identity-security/what-is-scim) - [The Ultimate Authentication Playbook](https://www.okta.com/blog/identity-security/the-ultimate-authentication-playbook) - [What Is SMS Authentication and Is It Secure?](https://www.okta.com/blog/identity-security/sms-authentication) - [What is Federation and Why Should Your Apps Support it?](https://www.okta.com/blog/identity-security/what-is-federation-and-why-should-your-apps-support-it) - [Securing the future of work: Why Zero Trust is critical in a hybrid world](https://www.okta.com/blog/identity-security/securing-the-future-of-work-why-zero-trust-is-critical-in-a-hybrid-world) - [The Need for Phishing-Resistant Multi-Factor Authentication](https://www.okta.com/blog/identity-security/the-need-for-phishing-resistant-multi-factor-authentication) - [New secure Identity integrations streamline advanced protection for your most critical applications](https://www.okta.com/blog/identity-security/new-secure-identity-integrations-streamline-advanced-protection-for-your-most-critical) - [What is WebAuthn?](https://www.okta.com/blog/identity-security/what-is-webauthn) - [The most targeted companies choose phishing-resistant MFA](https://www.okta.com/blog/identity-security/the-most-targeted-companies-choose-phishing-resistant-mfa) - [What is Zero Trust Security?](https://www.okta.com/blog/identity-security/what-is-zero-trust-security) - [What Is Provisioning and Deprovisioning?](https://www.okta.com/blog/identity-security/what-is-provisioning-and-deprovisioning) - [Three ways Customer Identity supports data compliance and security](https://www.okta.com/blog/identity-security/three-ways-customer-identity-supports-data-compliance-and-security) - [What Is Social Login and Is It Worth Implementing?](https://www.okta.com/blog/identity-security/social-login) - [What are Salted Passwords and Password Hashing?](https://www.okta.com/blog/identity-security/what-are-salted-passwords-and-password-hashing) - [Security Questions: Best Practices, Examples, and Ideas](https://www.okta.com/blog/identity-security/security-questions) - [Secure device access: The missing key to your security strategy](https://www.okta.com/blog/identity-security/secure-device-access-the-missing-key-to-your-security-strategy) - [The real value of passwordless authentication](https://www.okta.com/blog/identity-security/the-real-value-of-passwordless-authentication) - [Join the Passwordless Revolution: Stop Making People Use Passwords](https://www.okta.com/blog/identity-security/join-the-passwordless-revolution-stop-making-people-use-passwords) - [Improve security, reduce Identity sprawl, and manage accounts with Secure SaaS Service Accounts ](https://www.okta.com/blog/identity-security/improve-security-reduce-identity-sprawl-and-manage-accounts-with-secure-saas-service) - [What Is Identity Governance and Administration?](https://www.okta.com/blog/identity-security/identity-governance-and-administration) - [3 ways Okta can help you improve your security posture and respect privacy-forward human rights](https://www.okta.com/blog/identity-security/3-ways-okta-can-help-you-improve-your-security-posture-and-respect-privacy-forward) - [What Is Attribute-Based Access Control (ABAC)?](https://www.okta.com/blog/identity-security/attribute-based-access-control-abac) - [How we went passwordless at Okta](https://www.okta.com/blog/identity-security/how-we-went-passwordless-at-okta) - [Control Identity sprawl with Okta Identity Security Posture Management](https://www.okta.com/blog/identity-security/control-identity-sprawl-with-okta-identity-security-posture-management) - [Future-ready workforce protection: The case for Identity-powered security in financial services](https://www.okta.com/blog/identity-security/future-ready-workforce-protection-the-case-for-identity-powered-security-in-financial) - [Embracing Zero Trust with Okta: A modern path to IT security](https://www.okta.com/blog/identity-security/embracing-zero-trust-with-okta-a-modern-path-to-it-security) - [How to choose the right MFA for your small business](https://www.okta.com/blog/identity-security/how-to-choose-the-right-mfa-for-your-small-business-0) - [Introducing the Okta Secure Identity Commitment](https://www.okta.com/blog/identity-security/introducing-the-okta-secure-identity-commitment) - [What Is Biometric Authentication?](https://www.okta.com/blog/identity-security/biometric-authentication) - [An Exploration of Open Identity Standards](https://www.okta.com/blog/identity-security/exploration-of-open-identity-standards) - [Identity Security Posture Management: A new sheriff in town](https://www.okta.com/blog/identity-security/identity-security-posture-management-a-new-sheriff-in-town) - [What Is Data Misuse?](https://www.okta.com/blog/identity-security/data-misuse) - [What Are ICAM and FICAM?](https://www.okta.com/blog/identity-security/icam-and-ficam) - [Identity-led resilience: The new business imperative](https://www.okta.com/blog/identity-security/identity-led-resilience-the-new-business-imperative) - [How centralized Identity solutions streamline security and resident engagement](https://www.okta.com/blog/identity-security/how-centralized-identity-solutions-streamline-security-and-resident-engagement-0) - [Beyond MFA: Identity is evolving for a complicated world](https://www.okta.com/blog/identity-security/beyond-mfa-identity-is-evolving-for-a-complicated-world) - [Cybersecurity for the world’s most vulnerable](https://www.okta.com/blog/identity-security/cybersecurity-for-the-worlds-most-vulnerable) - [CIBA: Authenticate customers in call centers and other out-of-band scenarios](https://www.okta.com/blog/identity-security/ciba-authenticate-customers-in-call-centers-and-other-out-of-band-scenarios) - [A summary of Okta’s FIPS compliance](https://www.okta.com/blog/identity-security/a-summary-of-oktas-fips-compliance) - [How Okta simplifies NIS2 compliance: a deep dive](https://www.okta.com/blog/identity-security/how-okta-simplifies-nis2-compliance-a-deep-dive) - [Top 10 Ways To Automate IT & Security Tasks With Okta Workflows](https://www.okta.com/blog/identity-security/automate-it-security) - [How Okta is helping society prepare for future cyberthreats](https://www.okta.com/blog/identity-security/how-okta-is-helping-society-prepare-for-future-cyberthreats) - [6 Steps to Practice Strong Laptop Security](https://www.okta.com/blog/identity-security/6-steps-to-practice-strong-laptop-security) - [Okta Workflows How-To: Determine User Sign-In Location](https://www.okta.com/blog/identity-security/determine-user-sign-in-location) - [How Okta can help meet CMMC 2.0 Identity and Access Management requirements](https://www.okta.com/blog/identity-security/how-okta-can-help-meet-cmmc-2-0-identity-and-access-management-requirements) - [Contextual Access Management: What Does It Actually Mean?](https://www.okta.com/blog/identity-security/contextual-access-management-what-does-it-actually-mean) - [Help reshape Identity security: Join the IPSIE working group ](https://www.okta.com/blog/identity-security/help-reshape-identity-security-join-the-ipsie-working-group) - [Passkeys 101: What they are and how they will replace passwords](https://www.okta.com/blog/identity-security/passkeys-101-what-they-are-and-how-they-will-replace-passwords) - [MFA Fatigue: A Growing Security Concern](https://www.okta.com/blog/identity-security/mfa-fatigue-growing-security-concern) - [Leveraging Identity to discover vulnerabilities and determine proper access](https://www.okta.com/blog/identity-security/leveraging-identity-to-discover-vulnerabilities-and-determine-proper-access) - [Highly Regulated Identity: The key to easier, more secure customer interactions](https://www.okta.com/blog/identity-security/highly-regulated-identity-the-key-to-easier-more-secure-customer-interactions) - [Okta’s commitment to CAEP and SSF: Pioneering secure, interoperable Identity standards](https://www.okta.com/blog/identity-security/oktas-commitment-to-caep-and-ssf-pioneering-secure-interoperable-identity-standards) - [What Is a Password Manager and Is It Safe to Use One?](https://www.okta.com/blog/identity-security/password-manager) - [Least privilege for your critical Identity roles: Introducing ‘Govern Okta Admin Roles’](https://www.okta.com/blog/identity-security/least-privilege-for-your-critical-identity-roles-introducing-govern-okta-admin-roles) - [Need to evolve your authorization strategy? Five questions to ask](https://www.okta.com/blog/identity-security/need-to-evolve-your-authorization-strategy-five-questions-to-ask) - [How to Manage Linux Identities Without LDAP](https://www.okta.com/blog/identity-security/how-to-manage-linux-identities-without-ldap) - [Leveraging Okta MFA to Secure Access and Adopt Windows Hello for Business](https://www.okta.com/blog/identity-security/leveraging-okta-mfa-to-secure-access-and-adopt-windows-hello-for-business) - [Overcoming security team challenges with cloud and SaaS local accounts](https://www.okta.com/blog/identity-security/overcoming-security-team-challenges-with-cloud-and-saas-local-accounts) - [Today’s Mobile Security Threats: What Are They and How Can You Prevent Them?](https://www.okta.com/blog/identity-security/mobile-security-threats-and-prevention) - [Meet regulatory, framework, and standards obligations with Okta Identity Governance](https://www.okta.com/blog/identity-security/meet-regulatory-framework-and-standards-obligations-with-okta-identity-governance) - [Resilience redefined: Strengthening Identity availability](https://www.okta.com/blog/identity-security/resilience-redefined-strengthening-identity-availability) - [What Is Multi-Factor Authentication (MFA)?](https://www.okta.com/blog/identity-security/multi-factor-authentication-mfa) - [Close of acquisition: Spera Security joins forces with Okta to advance Identity-powered security](https://www.okta.com/blog/identity-security/okta-acquisition-advances-identity-powered-security) - [Password spraying detection: Where do I start?](https://www.okta.com/blog/identity-security/password-spraying-detection-where-to-start) - [Leveraging Identity to detect and respond to potential attacks faster](https://www.okta.com/blog/identity-security/leveraging-identity-to-detect-and-respond-to-potential-attacks-faster) - [Leveraging Identity to enforce secure-by-design access policies](https://www.okta.com/blog/identity-security/leveraging-identity-to-enforce-secure-by-design-access-policies) - [Agent security: 3 tips to step up your Active Directory agent game](https://www.okta.com/blog/identity-security/agent-security-3-tips-to-step-up-your-active-directory-agent-game) - [Authorization BACk to basics: RBAC vs. ReBAC](https://www.okta.com/blog/identity-security/authorization-back-to-basics-rbac-vs-rebac) - [What Is Data Theft?](https://www.okta.com/blog/identity-security/data-theft) - [Battling Bots: The Identity Threat Level (ITL)](https://www.okta.com/blog/identity-security/battling-bots-the-identity-threat-level-itl) - [Cybersecurity your users can love](https://www.okta.com/blog/identity-security/cybersecurity-your-users-can-love) - [9 Admin Best Practices to Keep your Org Secure](https://www.okta.com/blog/identity-security/9-admin-best-practices-to-keep-your-org-secure) - [Device flow and Okta: Shared device authentication for consumers](https://www.okta.com/blog/identity-security/device-flow-and-okta-shared-device-authentication-for-consumers) - [Modern identity at work: Productivity meets security](https://www.okta.com/blog/identity-security/modern-identity-at-work-productivity-meets-security) - [Identity governance: Converged vs. disparate models](https://www.okta.com/blog/identity-security/identity-governance-converged-vs-disparate-models) - [Insights from our experience: Okta deploys Okta Device Access](https://www.okta.com/blog/identity-security/insights-from-our-experience-okta-deploys-okta-device-access) - [The problem with legacy thinking around identity security](https://www.okta.com/blog/identity-security/the-problem-with-legacy-thinking-around-identity-security) - [The surprising details behind your MFA enforcement status](https://www.okta.com/blog/identity-security/the-surprising-details-behind-your-mfa-enforcement-status) - [Adding passkeys to your apps with Okta CIC powered by Auth0](https://www.okta.com/blog/product-innovation/adding-passkeys-to-your-apps-with-okta-cic-powered-by-auth0) - [Flowcase 2022: Celebrating Okta Workflows Leaders Driving Innovation in Identity Automation](https://www.okta.com/blog/product-innovation/flowcase-2022-celebrating-okta-workflows-leaders-driving-innovation-in-identity) - [Actions Templates to power extensibility with Okta CIC Powered by Auth0](https://www.okta.com/blog/product-innovation/actions-templates-to-power-extensibility-with-okta-cic-powered-by-auth0) - [An Automated Approach to Convert Okta System Logs into Open Cybersecurity Schema Framework (OCSF) Schema](https://www.okta.com/blog/product-innovation/an-automated-approach-to-convert-okta-system-logs-into-open-cybersecurity-schema) - [CIAM by example: Four recipes to improve security and UX](https://www.okta.com/blog/product-innovation/ciam-by-example-four-recipes-to-improve-security-and-ux) - [Build your app or service right from the get-go](https://www.okta.com/blog/product-innovation/build-your-app-or-service-right-from-the-get-go) - [Extend your passwordless journey to device login](https://www.okta.com/blog/product-innovation/extend-your-passwordless-journey-to-device-login) - [99.99% Uptime For Every Customer](https://www.okta.com/blog/product-innovation/99-point-99-percent-uptime-for-all) - [Okta Workflows How-To: Find the JSON Object Passed From a Streaming Action to a Helper Flow](https://www.okta.com/blog/product-innovation/find-the-json-object-passed-from-streaming-to-helper-flow) - [Go beyond the login box with Customer Identity Cloud](https://www.okta.com/blog/product-innovation/go-beyond-the-login-box-with-customer-identity-cloud) - [CIAM by example in four recipes: Prevent fraudulent activity](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-prevent-fraudulent-activity) - [Beyond login: Enabling rapid innovation for SaaS](https://www.okta.com/blog/product-innovation/beyond-login-enabling-rapid-innovation-for-saas) - [Customer Identity Cloud and accessible authentication](https://www.okta.com/blog/product-innovation/customer-identity-cloud-and-accessible-authentication) - [Learn How to Automate Identity Processes With Workflows: 11 Online Meetups Recordings](https://www.okta.com/blog/product-innovation/automate-identity-processes-with-workflows) - [Desktop MFA from Okta — Its time has come](https://www.okta.com/blog/product-innovation/desktop-mfa-from-okta-its-time-has-come) - [CIAM by example in four recipes: Build for data privacy and compliance](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-build-for-data-privacy-and-compliance) - [Enhanced security and phishing resistance for unmanaged iOS devices with Okta FastPass](https://www.okta.com/blog/product-innovation/enhanced-security-and-phishing-resistance-for-unmanaged-ios-devices-with-okta-fastpass) - [CIAM by example in four recipes: Send data to marketing for personalization](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-send-data-to-marketing-for-personalization) - [Configuring Progressive Profiling for Your Custom Apps](https://www.okta.com/blog/product-innovation/configuring-progressive-profiling-for-your-custom-apps) - [A leap forward in token security: Okta adds support for DPoP](https://www.okta.com/blog/product-innovation/a-leap-forward-in-token-security-okta-adds-support-for-dpop) - [Automating Security Operations with Okta Workflows](https://www.okta.com/blog/product-innovation/automating-security-operations-with-okta-workflows) - [CIAM by example in four recipes: Add passwordless auth with passkeys ](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-add-passwordless-auth-with-passkeys) - [Understanding Okta Workflows Events](https://www.okta.com/blog/product-innovation/okta-workflows-events) - [Okta Workflows is audit ready for FedRAMP High](https://www.okta.com/blog/product-innovation/okta-workflows-is-audit-ready-for-fedramp-high) - [Customize signup and login with Forms, Okta’s no-code extensibility feature now Generally Available](https://www.okta.com/blog/product-innovation/okta-forms-now-generally-available) - [Okta Privileged Access and simplified developer experiences: The latest in Okta product capabilities](https://www.okta.com/blog/product-innovation/okta-privileged-access-and-simplified-developer-experiences-the-latest-in-okta-product) - [New in Workflows: Security Operations Solution Packs](https://www.okta.com/blog/product-innovation/new-in-workflows-security-operations-solution-packs) - [Secure On-Premises Solutions with Okta: Secret Features + a Preview](https://www.okta.com/blog/product-innovation/secure-on-premises-solutions-with-okta-secret-features-a-preview) - [Okta Device Access: Identity-powered security starts at power up](https://www.okta.com/blog/product-innovation/okta-device-access-identity-powered-security-starts-at-power-up) - [Okta FastPass: Phishing-resistant MFA](https://www.okta.com/blog/product-innovation/okta-fastpass-phishing-resistant-mfa) - [Okta Fine Grained Authorization is now available in private cloud on AWS](https://www.okta.com/blog/product-innovation/okta-fine-grained-authorization-is-now-available-in-private-cloud-on-aws) - [Okta Workflows joins the Okta Developer Forum](https://www.okta.com/blog/product-innovation/okta-workflows-joins-the-okta-developer-forum) - [Okta Passkey Management: A New Feature Flag](https://www.okta.com/blog/product-innovation/okta-passkey-management-a-new-feature-flag) - [Okta Workflows How-To: Read a Custom User Profile Attribute](https://www.okta.com/blog/product-innovation/read-a-custom-user-profile-attribute) - [Okta’s Redesigned End User Dashboard - Now 50% Faster!](https://www.okta.com/blog/product-innovation/oktas-redesigned-end-user-dashboard-now-50-faster) - [Okta launches Okta Verify for Apple Vision Pro ](https://www.okta.com/blog/product-innovation/okta-launches-okta-verify-for-apple-vision-pro) - [Build Workflows API Connectors with the Connector Builder](https://www.okta.com/blog/product-innovation/workflows-connector-builder) - [New in Workflows: Organize Your Flows in Folders and Subfolders](https://www.okta.com/blog/product-innovation/organize-your-flows-in-folders-and-subfolders) - [Okta Identity Security Posture Management and Workflows: Automated detection and remediation of local accounts](https://www.okta.com/blog/product-innovation/okta-identity-security-posture-management-and-workflows-automated-detection-and) - [Okta FastPass: Authorized at FedRAMP High and supports Authentication Assurance Level 3 (AAL3)](https://www.okta.com/blog/product-innovation/okta-fastpass-the-modern-authenticator-the-public-sector-deserves) - [Ready to deliver better customer experiences? No-code Identity orchestration is your answerx](https://www.okta.com/blog/product-innovation/ready-to-deliver-better-customer-experiences-no-code-identity-orchestration-is-your) - [Okta Workflows How-To: Anything as a Source](https://www.okta.com/blog/product-innovation/okta-workflows-anything-as-a-source) - [Passkeys are Generally Available](https://www.okta.com/blog/product-innovation/passkeys-are-generally-available) - [Okta Workflows How-To: Setup a Workflows Helper Flow (With For-Each and Streaming Cards)](https://www.okta.com/blog/product-innovation/setup-a-workflows-helper-flow-with-for-each-and-streaming-cards) - [Okta Workflows How-To: Sending Automatic Emails to Groups Based on Employee Department](https://www.okta.com/blog/product-innovation/okta-workflows-automatic-emails) - [Setting the bar for Authz: Okta Fine Grained Authorization is now Generally Available](https://www.okta.com/blog/product-innovation/setting-the-bar-for-authz-okta-fine-grained-authorization-is-now-generally-available) - [Okta to improve user experience through Apple Business Manager](https://www.okta.com/blog/product-innovation/okta-to-improve-user-experience-through-apple-business-manager) - [New Dashboard role for Organizations support staff](https://www.okta.com/blog/product-innovation/new-dashboard-role-for-organizations-support-staff) - [Okta Privileged Access is generally available](https://www.okta.com/blog/product-innovation/okta-privileged-access-is-generally-available) - [New in Okta Workflows: 30-day Trial, Cancel Flow, monday.com and SFTP Connectors, and New Templates](https://www.okta.com/blog/product-innovation/new-in-workflows-free-trial-connectors-templates) - [Okta’s enhanced smart card auth helps keep gov resources safe](https://www.okta.com/blog/product-innovation/oktas-enhanced-smart-card-auth-helps-keep-gov-resources-safe) - [Okta Workflows Educational Resources – March 2024](https://www.okta.com/blog/product-innovation/workflows-resources-march-2024) - [Workflows for Customer Identity Cloud (CIC): Automating and customizing Identity processes with no-code](https://www.okta.com/blog/product-innovation/workflows-for-customer-identity-cloud) - [Okta and AWS Identity Center enforce JIT-privileged access](https://www.okta.com/blog/product-innovation/okta-and-aws-identity-center-enforce-jit-privileged-access) - [Understanding Okta Workflows Connectors](https://www.okta.com/blog/product-innovation/okta-workflows-connectors) - [Okta’s Redesigned Admin Console and Dashboard — Now in GA!](https://www.okta.com/blog/product-innovation/oktas-redesigned-admin-console-and-dashboard-now-in-ga) - [Cooking up success:Get familiar with Okta Workflows features to unlock no-code automation](https://www.okta.com/blog/product-innovation/cooking-up-successget-familiar-with-okta-workflows-features-to-unlock-no-code) - [New in Workflows: Low-Latency Flows Can Now Run Up to 10 Times Faster](https://www.okta.com/blog/product-innovation/low-latency-flows-can-now-run-up-to-10-times-faster) - [Fine Grained Authorization and new Okta Privileged Access features: The latest in Okta product capabilities](https://www.okta.com/blog/product-innovation/fine-grained-authorization-and-new-okta-privileged-access-features-the-latest-in-okta) - [Okta Workflows How-To: Iterate Over Rows in a Table](https://www.okta.com/blog/product-innovation/iterate-over-rows-in-a-table-in-okta-workflows) - [Faster, easier, and more secure customer logins with passkeys in Okta](https://www.okta.com/blog/product-innovation/faster-easier-and-more-secure-customer-logins-with-passkeys-in-okta) - [Okta Workflows How-To: Fix the 403 Forbidden Error When Using Search Systems Logs Card](https://www.okta.com/blog/product-innovation/fix-the-403-forbidden-error-when-using-search-systems-logs-card) - [Fine Grained Authorization: A flexible solution for all](https://www.okta.com/blog/product-innovation/fine-grained-authorization-a-flexible-solution-for-all) - [Okta Workflows How-To: How to Delete Deactivated Users](https://www.okta.com/blog/product-innovation/how-to-delete-deactivated-users) - [Connecting your HR system to Okta](https://www.okta.com/blog/product-innovation/connecting-your-hr-system-to-okta) - [Better together: Using the Okta integration with HashiCorp Terraform](https://www.okta.com/blog/product-innovation/better-together-using-the-okta-integration-with-hashicorp-terraform) - [Launch Week '24: Oktane edition](https://www.okta.com/blog/product-innovation/launch-week-24-oktane-edition) - [How Okta + AWS IAM Identity Center Simplifies Admin and Adds CLI Support](https://www.okta.com/blog/product-innovation/how-okta-aws-iam-identity-center-simplifies-admin-and-adds-cli-support) - [Okta Workflows How-To: Iterate Over Items and Create a New List (Using the List – Map Card)](https://www.okta.com/blog/product-innovation/iterate-over-items-and-create-a-new-list) - [Okta Identity Governance: A Unified IAM and Governance Solution](https://www.okta.com/blog/product-innovation/introducing-okta-identity-governance) - [Customer Identity Cloud enhancements to prevent account takeover](https://www.okta.com/blog/product-innovation/customer-identity-cloud-enhancements-to-prevent-account-takeover) - [Innovation Ignited: How technologists spark innovation with Identity](https://www.okta.com/blog/product-innovation/innovation-ignited-how-technologists-spark-innovation-with-identity) - [Leveraging Realms to manage your complex workforce](https://www.okta.com/blog/product-innovation/leveraging-realms-to-manage-your-complex-workforce) - [Innovation ignited: How product leaders fuel innovation with digital Identity](https://www.okta.com/blog/product-innovation/innovation-ignited-how-product-leaders-fuel-innovation-with-digital-identity) - [Automate Active Directory cleanup with Okta Workflows and Open AI](https://www.okta.com/blog/product-innovation/automate-active-directory-cleanup-with-okta-workflows-and-open-ai) - [Announcing Entitlement Management for Okta Identity Governance](https://www.okta.com/blog/product-innovation/announcing-entitlement-management-for-okta-identity-governance) - [Okta Workflows Tutorial: Import Users from Google Sheets and Create Users in Okta](https://www.okta.com/blog/product-innovation/import-users-from-google-sheets-create-users-in-okta) - [Jumpstart Identity with automation](https://www.okta.com/blog/product-innovation/jumpstart-identity-with-automation) - [Five Okta Workflows Resources You Must Know About](https://www.okta.com/blog/product-innovation/five-okta-workflows-resources) - [FastPass expands phishing resistance with device-bound passcode option](https://www.okta.com/blog/product-innovation/fastpass-expands-phishing-resistance-with-device-bound-passcode-option) - [How Okta’s New Plaid Integration Keeps Your Banking Secure](https://www.okta.com/blog/product-innovation/how-oktas-new-plaid-integration-keeps-your-banking-secure) - [Okta Workflows How-To: Build a Custom Connector in Okta Workflows, a 7-Part Video Series](https://www.okta.com/blog/product-innovation/build-custom-connector-in-okta-workflows) - [How an IL4 Identity Provider Successfully Services IL5 Environments](https://www.okta.com/blog/product-innovation/how-an-il4-identity-provider-successfully-services-il5-environments) - [Introduction to Okta Workflows](https://www.okta.com/blog/product-innovation/introduction-to-okta-workflows) - [New in Okta Workflows: Duplicate Cards, New Connectors and Templates](https://www.okta.com/blog/product-innovation/new-in-workflows-duplicate-cards) - [Okta expands device assurance with Google Chrome integration](https://www.okta.com/blog/product-innovation/okta-expands-device-assurance-with-google-chrome-integration) - [Introducing Anything-as-a-Source](https://www.okta.com/blog/product-innovation/introducing-anything-as-a-source) - [Magic Links: Passwordless Login for Your Users](https://www.okta.com/blog/product-innovation/magic-links) - [Introducing Okta’s Secure Identity Assessment: Your path to reducing Identity debt](https://www.okta.com/blog/product-innovation/introducing-oktas-secure-identity-assessment-your-path-to-reducing-identity-debt) - [How to use Webhooks with Okta](https://www.okta.com/blog/product-innovation/how-to-use-webhooks-with-okta) - [Introducing Okta's Identity Adoption Model for Zero Trust](https://www.okta.com/blog/product-innovation/introducing-oktas-identity-adoption-model-for-zero-trust) - [Improved login for SaaS users](https://www.okta.com/blog/product-innovation/improved-login-for-saas-users) - [Launch Week ‘24: Customer Identity Solution edition](https://www.okta.com/blog/product-innovation/launch-week-24-customer-identity-solution-edition) - [Okta Privileged Access launches in Asia Pacific](https://www.okta.com/blog/product-innovation/okta-privileged-access-launches-in-asia-pacific) - [Learn to Integrate Okta and Oracle Weblogic with the LDAP Interface](https://www.okta.com/blog/product-innovation/learn-to-integrate-okta-and-oracle-weblogic-with-the-ldap-interface) - [Introducing new icons for our flagship product lines](https://www.okta.com/blog/product-innovation/introducing-new-icons-for-our-flagship-product-lines) - [New enhancements to the Workforce Identity Cloud's unified security solution announced at Oktane 2024](https://www.okta.com/blog/product-innovation/new-enhancements-to-the-workforce-identity-clouds-unified-security-solution-announced) - [Launch Week ‘24: Oktane edition — Customer Identity Solution](https://www.okta.com/blog/product-innovation/launch-week-24-oktane-edition-customer-identity-solution) - [Multiple brand experiences in a single org — made easy](https://www.okta.com/blog/product-innovation/multiple-brand-experiences-in-a-single-org-made-easy) - [Inbound SCIM for Okta Customer Identity Cloud is now Generally Available](https://www.okta.com/blog/product-innovation/inbound-scim-for-okta-customer-identity-cloud-is-now-generally-available) - [Okta Workflows authorized at FedRAMP High: A new era of secure automation for the U.S. Public Sector](https://www.okta.com/blog/product-innovation/okta-workflows-authorized-at-fedramp-high-a-new-era-of-secure-automation-for-the-u-s) - [Okta Workflows How-To: Read a JSON Path With Dot-Notation](https://www.okta.com/blog/product-innovation/how-to-read-a-json-path-with-dot-notation) - [Okta Workflows How-To: Iterate Over a JSON Object (or How to Use the Object – For Each Card)](https://www.okta.com/blog/product-innovation/iterate-over-a-json-object) - [Innovation ignited: How development leaders make authentication an innovation engine](https://www.okta.com/blog/product-innovation/innovation-ignited-how-development-leaders-make-authentication-an-innovation-engine) - [Okta Workflows How-To: Use Workflows for Inline Hooks](https://www.okta.com/blog/product-innovation/how-to-use-workflows-for-inline-hooks) - [What is Okta’s Financial Grade Identity™?](https://www.okta.com/blog/product-innovation/okta-financial-grade-identity) - [Okta Customer Identity Cloud for SaaS Apps Explained](https://www.okta.com/blog/product-innovation/okta-cic-for-saas-apps) - [Innovation ignited: How security leaders enable innovation with Identity](https://www.okta.com/blog/product-innovation/innovation-ignited-how-security-leaders-enable-innovation-with-identity) - [How Kyocera AVX Maximizes Security and Efficiency with Okta Workflows and Splunk](https://www.okta.com/blog/customers-and-partners/how-kyocera-avx-maximizes-security-and-efficiency-with-okta-workflows-and-splunk) - [How Identity is helping Varo Bank and JCB streamline compliance and deliver value to their workforce](https://www.okta.com/blog/customers-and-partners/how-identity-is-helping-varo-bank-and-jcb-streamline-compliance-and-deliver-value-to) - [Answering children in crisis with cloud technology](https://www.okta.com/blog/customers-and-partners/answering-children-in-crisis-with-cloud-technology) - [Akumin scales Identity management processes with Okta Workflows](https://www.okta.com/blog/customers-and-partners/akumin-scales-identity-management-processes-with-okta-workflows) - [How BeyondID closes digital gaps with Okta connectors](https://www.okta.com/blog/customers-and-partners/how-beyondid-closes-digital-gaps-with-okta-connectors) - [AWS AppFabric and Okta streamline access and authorization](https://www.okta.com/blog/customers-and-partners/aws-appfabric-and-okta-streamline-access-and-authorization) - [How Thoughtworks solves the big (and small) problems with Okta Workflows](https://www.okta.com/blog/customers-and-partners/how-thoughtworks-solves-the-big-and-small-problems-with-okta-workflows) - [Customers Name Okta as Top Choice for IGA](https://www.okta.com/blog/customers-and-partners/customers-name-okta-as-top-choice-for-iga) - [How Identity accelerates M&A for Mars and Warner Bros. Discovery](https://www.okta.com/blog/customers-and-partners/how-identity-accelerates-ma-for-mars-and-warner-bros-discovery) - [How Okta CIC is driving revenue and engagement in higher ed](https://www.okta.com/blog/customers-and-partners/how-okta-cic-is-driving-revenue-and-engagement-in-higher-ed) - [Built for growth: how Okta and AWS power smart manufacturing](https://www.okta.com/blog/customers-and-partners/built-for-growth-how-okta-and-aws-power-smart-manufacturing) - [How Okta and AWS are securing trust in healthcare](https://www.okta.com/blog/customers-and-partners/how-okta-and-aws-are-securing-trust-in-healthcare) - [Creating a secure environment for teachers and students to harness emerging technology](https://www.okta.com/blog/customers-and-partners/creating-a-secure-environment-for-teachers-and-students-to-harness-emerging-technology) - [Here's How Okta is Elevating the Partner Experience](https://www.okta.com/blog/customers-and-partners/heres-how-okta-is-elevating-the-partner-experience) - [Beyond the perimeter: How Okta, CrowdStrike, and Zscaler deliver end-to-end Zero Trust](https://www.okta.com/blog/customers-and-partners/beyond-the-perimeter-how-okta-crowdstrike-and-zscaler-deliver-end-to-end-zero-trust) - [Driving retail growth with Okta and AWS](https://www.okta.com/blog/customers-and-partners/driving-retail-growth-with-okta-and-aws) - [Introducing Universal Logout for all Adaptive MFA customers](https://www.okta.com/blog/company-and-culture/introducing-universal-logout-for-all-adaptive-mfa-customers) - [Working hard, living fully: My experience at Okta](https://www.okta.com/blog/company-and-culture/working-hard-living-fully-my-experience-at-okta) - [The next chapter for Okta Privileged Access: Integrating Axiom to accelerate our roadmap](https://www.okta.com/blog/company-and-culture/the-next-chapter-for-okta-privileged-access-integrating-axiom-to-accelerate-our) - [Spotlight on Preston King: A pillar of support, innovation, and leadership in the “What’s Next” program](https://www.okta.com/blog/company-and-culture/spotlight-on-preston-king-a-pillar-of-support-innovation-and-leadership-in-the-whats) - [From athlete to award-winning sales professional: Growing my sales career at Okta](https://www.okta.com/blog/company-and-culture/from-athlete-to-award-winning-sales-professional-growing-my-sales-career-at-okta) - [Three years of Okta’s nonprofit technology fellowship](https://www.okta.com/blog/company-and-culture/three-years-of-oktas-nonprofit-technology-fellowship-0) - [The State of Inclusion at Okta: Working to integrate equity](https://www.okta.com/blog/company-and-culture/the-state-of-inclusion-at-okta-working-to-integrate-equity) - [Okta Badges vs. Okta Certification: Understanding the difference and why you should get one](https://www.okta.com/blog/company-and-culture/okta-badges-vs-okta-certification-understanding-the-difference-and-why-you-should-get) - [Uninterruptible testing at Okta](https://www.okta.com/blog/company-and-culture/uninterruptible-testing-at-okta) - [Okta’s Newest Office: Hello, Bellevue!](https://www.okta.com/blog/company-and-culture/oktas-newest-office-hello-bellevue) - [Going green, growing together: Introducing Okta's partner sustainability badge](https://www.okta.com/blog/company-and-culture/going-green-growing-together-introducing-oktas-partner-sustainability-badge) - [The story behind Okta’s values](https://www.okta.com/blog/company-and-culture/the-story-behind-oktas-values) - [Growing our San Francisco Base: Welcome to our New HQ](https://www.okta.com/blog/company-and-culture/growing-our-san-francisco-base-welcome-to-our-new-hq) - [Spotlight on Cherry Yang: A journey of resilience, mentorship, and leadership in Identity](https://www.okta.com/blog/company-and-culture/spotlight-on-cherry-yang-a-journey-of-resilience-mentorship-and-leadership-in-identity) - [Okta’s Newest Office: Downtown Toronto!](https://www.okta.com/blog/company-and-culture/toronto-office-opening) - [Okta’s commitment to 100% renewable electricity: Powering positive change](https://www.okta.com/blog/company-and-culture/oktas-commitment-to-100-renewable-electricity-powering-positive-change) - [Why Okta is Privacy-Forward](https://www.okta.com/blog/company-and-culture/why-okta-is-privacy-forward) - [Founders in Focus: David Goldschlag of Aembit](https://www.okta.com/blog/company-and-culture/founders-in-focus-david-goldschlag-of-aembit) - [Oktane 2024: The future of Identity security](https://www.okta.com/blog/company-and-culture/oktane-2024-the-future-of-identity-security) - [Updated Okta Statement on LAPSUS$](https://www.okta.com/blog/company-and-culture/updated-okta-statement-on-lapsus) - [Spotlight on Dr. Peter Scheuermann: A story of perseverance, continuous learning, and community](https://www.okta.com/blog/company-and-culture/spotlight-on-dr-peter-scheuermann-a-story-of-continuous-learning-and-community) - [Scaling success: How the Oktane Ambassador Program unleashed the power of our people](https://www.okta.com/blog/industry-insights/scaling-success-how-the-oktane-ambassador-program-unleashed-the-power-of-our-people) - [What Is Data Security?](https://www.okta.com/blog/industry-insights/data-security) - [Using SIEM and Identity to Protect Against Data Breaches](https://www.okta.com/blog/industry-insights/using-siem-and-identity-to-protect-against-data-breaches) - [Usability and utility: How users establish usefulness](https://www.okta.com/blog/industry-insights/usability-and-utility-how-users-establish-usefulness) - [Security and sustainability through people, processes, and technology](https://www.okta.com/blog/industry-insights/security-and-sustainability-through-people-processes-and-technology) - [Identity as a catalyst: Transforming government culture in the digital age](https://www.okta.com/blog/industry-insights/identity-as-a-catalyst-transforming-government-culture-in-the-digital-age) - [Prevent toxic access combinations with Separation of Duties in Okta Identity Governance](https://www.okta.com/blog/industry-insights/prevent-toxic-access-combinations-with-separation-of-duties-in-okta-identity) - [What Is Identity Proofing?](https://www.okta.com/blog/industry-insights/what-is-identity-proofing) - [Oktane 2025 preview: Identity security as the public sector’s AI-ready control plane](https://www.okta.com/blog/industry-insights/oktane-2025-preview-identity-security-as-the-public-sectors-ai-ready-control-plane) - [Automating and extending advanced security operations with Workflows](https://www.okta.com/blog/industry-insights/automating-and-extending-advanced-security-operations-with-workflows) - [Building resident trust: How a seamless Identity platform transforms U.S. government services](https://www.okta.com/blog/industry-insights/building-resident-trust-how-a-seamless-identity-platform-transforms-u-s-government) - [Beyond human users: Why identity governance for AI agents is your next big challenge](https://www.okta.com/blog/industry-insights/beyond-human-users-why-identity-governance-for-ai-agents-is-your-next-big-challenge) - [Identity as the ultimate integrator](https://www.okta.com/blog/industry-insights/identity-as-the-ultimate-integrator) - [The Labubu blind box for your enterprise: Unmasking AI agents across industries](https://www.okta.com/blog/industry-insights/the-labubu-blind-box-for-your-enterprise-unmasking-ai-agents-across-industries) - [Unlocking SaaS Security: How Identity can help](https://www.okta.com/blog/industry-insights/unlocking-saas-security-how-identity-can-help) - [Making MFA mandatory for securing the admin console front door](https://www.okta.com/blog/industry-insights/making-mfa-mandatory-for-securing-the-admin-console-front-door) - [Founders in Focus: Itamar Golan of Prompt Security](https://www.okta.com/blog/company-and-culture/founders-in-focus-itamar-golan-of-prompt-security) - [Everyone means everyone: Okta's ongoing path to accessibility](https://www.okta.com/blog/company-and-culture/everyone-means-everyone-oktas-ongoing-path-to-accessibility) - [Beyond commitment: Okta’s journey towards racial equity](https://www.okta.com/blog/company-and-culture/beyond-commitment-oktas-journey-towards-racial-equity) - [Founders in Focus: Emanuel Salmona of Nagomi Security](https://www.okta.com/blog/company-and-culture/founders-in-focus-emanuel-salmona-of-nagomi-security) - [Five Game-changing lessons I learned as a Product Manager intern at Okta](https://www.okta.com/blog/company-and-culture/five-game-changing-lessons-i-learned-as-a-product-manager-intern-at-okta) - [Founders in Focus: Marshall Pribadi of Privy](https://www.okta.com/blog/company-and-culture/founders-in-focus-marshall-pribadi-of-privy) - [Founders in Focus: Rajeev Behera of Every](https://www.okta.com/blog/company-and-culture/founders-in-focus-rajeev-behera-of-every) - [Founders in Focus: Kieran Donovan of k-ID](https://www.okta.com/blog/company-and-culture/founders-in-focus-kieran-donovan-of-k-id) - [Coming soon: Okta Launch Week, July 15–19](https://www.okta.com/blog/company-and-culture/coming-soon-okta-launch-week-july-15-19) - [From engineer to leader: Thevie Chea’s success story at Okta](https://www.okta.com/blog/company-and-culture/from-engineer-to-leader-thevie-cheas-success-story-at-okta) - [Founders in Focus: Moty Jacob of SURF Security](https://www.okta.com/blog/company-and-culture/founders-in-focus-moty-jacob-of-surf-security) - [The impact of employee volunteering with Okta for Good](https://www.okta.com/blog/company-and-culture/employee-volunteering-with-okta-for-good) - [Cultivating an innovation culture — the power of hackathons](https://www.okta.com/blog/company-and-culture/cultivating-an-innovation-culture-the-power-of-hackathons) - [Amplifying the power of recognition with Oktappreciate](https://www.okta.com/blog/company-and-culture/amplifying-the-power-of-recognition-with-oktappreciate) - [Beyond compliance: Elevating Okta’s ESG with security and trust](https://www.okta.com/blog/company-and-culture/beyond-compliance-elevating-oktas-esg-with-security-and-trust) - [Behind the Scenes of Our Brand Evolution](https://www.okta.com/blog/company-and-culture/behind-the-scenes-of-our-brand-evolution) - [Announcing the 2023 Okta For Good Impact Report](https://www.okta.com/blog/company-and-culture/announcing-the-2023-okta-for-good-impact-report) - [Celebrating excellence: Okta’s Certified Technical Architects shine on the Nasdaq Tower](https://www.okta.com/blog/company-and-culture/celebrating-excellence-oktas-certified-technical-architects-shine-on-the-nasdaq-tower) - [Founders in Focus: Paul Klein IV of Browserbase](https://www.okta.com/blog/company-and-culture/founders-in-focus-paul-klein-iv-of-browserbase) - [Building a more secure world: Okta for Good’s $50 million, five-year commitment](https://www.okta.com/blog/company-and-culture/building-a-more-secure-world-okta-for-goods-50-million-five-year-commitment) - [Stay secure with FastPass and Trusted App Filters](https://www.okta.com/blog/product-innovation/stay-secure-with-fastpass-and-trusted-app-filters) - [Set Up API Connector Dynamic Input Fields in the Okta Workflows Connector Builder](https://www.okta.com/blog/product-innovation/workflows-connector-builder-action-dynamic-inputs) - [Introducing the Okta Devices SDK and API: A Better Way to Secure and Delight Mobile Users](https://www.okta.com/blog/product-innovation/showcase20-introducing-the-okta-devices-sdk-and-api-a-better-way-to-secure-and-delight-mobile-users) - [Unifying the look and feel of Okta’s products](https://www.okta.com/blog/product-innovation/unifying-the-look-and-feel-of-oktas-products) - [Simple and secure user experiences: The latest on Okta Customer Identity Solution](https://www.okta.com/blog/product-innovation/simple-and-secure-user-experiences-the-latest-on-okta-customer-identity-solution) - [Launch Week: Mid-Year Edition](https://www.okta.com/blog/product-innovation/launch-week-25-mid-year-update) - [Delegating macOS login authentication to Okta](https://www.okta.com/blog/product-innovation/delegating-macos-login-authentication-to-okta) - [Unlock SaaS growth with enterprise-ready identity](https://www.okta.com/blog/product-innovation/unlock-saas-growth-with-enterprise-ready-identity) - [Why you should migrate to OAuth 2.0 from static API tokens](https://www.okta.com/blog/product-innovation/why-you-should-migrate-to-oauth-2-0-from-static-api-tokens) - [Okta Workflows Tutorial: Notify When a User is Added to a Group (with Event Hook filtering)](https://www.okta.com/blog/product-innovation/workflows-event-hook-tutorial) - [Okta Workflows Tutorial: Send a Rich Message to Microsoft Teams for a New Okta Event Using Microsoft API](https://www.okta.com/blog/product-innovation/workflows-send-rich-message-with-microsoft-api) - [Okta Workflows How-To: Search for Groups Using Custom Search Criteria in Okta Workflows](https://www.okta.com/blog/product-innovation/search-for-groups-using-custom-search-criteria) - [A new way to buy Okta: Simplified solution pricing to unlock Workforce Identity](https://www.okta.com/blog/product-innovation/a-new-way-to-buy-okta-simplified-solution-pricing-to-unlock-workforce-identity) - [Okta Workflows Tutorial: Send an Email Notification for a New Okta Event](https://www.okta.com/blog/product-innovation/send-email-notification-okta-event) - [Using Okta for Conditional Access to AWS Assets with MFA Validation](https://www.okta.com/blog/product-innovation/using-okta-for-conditional-access-to-aws-assets) - [Learn About the Differences Between Three Workflows List Functions: For Each, Map, and Reduce](https://www.okta.com/blog/product-innovation/three-workflows-list-functions-for-each-map-and-reduce) - [Okta Workflows Tutorial: Send a Microsoft Teams Notification for a New Okta Event](https://www.okta.com/blog/product-innovation/workflows-send-microsoft-teams-notification) - [Secure your devices with Okta's Desktop MFA](https://www.okta.com/blog/product-innovation/secure-your-devices-with-oktas-desktop-mfa) - [One platform, every identity: Unifying Okta Customer Identity with Okta Workforce Identity](https://www.okta.com/blog/product-innovation/one-platform-every-identity-unifying-okta-customer-identity-with-okta-workforce) - [Solving authorization for B2B SaaS at Okta](https://www.okta.com/blog/product-innovation/solving-authorization-for-b2b-saas-at-okta) - [Okta Workflows Tutorial: Notify When A User Is Suspended](https://www.okta.com/blog/product-innovation/workflows-tutorial-notify-when-a-user-is-suspended) - [Using Redirect with Actions to gather user info and increase conversions](https://www.okta.com/blog/product-innovation/using-redirect-with-actions-to-gather-user-info-and-increase-conversions) - [Okta Workflows Tutorial: Build a Connector for Spotify API (with OAuth 2.0)](https://www.okta.com/blog/product-innovation/workflows-connector-builder-oauth-tutorial) - [Identity Threat Protection with Okta AI ](https://www.okta.com/blog/product-innovation/identity-threat-protection-with-okta-ai) - [Unveiling new and improved product features — 6 month lookback](https://www.okta.com/blog/product-innovation/unveiling-new-and-improved-product-features-6-month-lookback) - [Resilience redefined: Strengthening identity availability in EMEA and Australia](https://www.okta.com/blog/product-innovation/resilience-redefined-strengthening-identity-availability-in-emea-and-australia) - [Launch Week ‘25: Showcase edition](https://www.okta.com/blog/product-innovation/launch-week-25-showcase-edition) - [Okta introduces Custom Admin Roles for Identity Threat Protection with Okta AI](https://www.okta.com/blog/product-innovation/okta-introduces-custom-admin-roles-for-identity-threat-protection-with-okta-ai) - [Okta Workflows How-To: Write Output From the List Users Card to a CSV File](https://www.okta.com/blog/product-innovation/write-output-from-the-list-users-card-to-a-csv-file) - [Okta advances device context features for Zero Trust security](https://www.okta.com/blog/product-innovation/okta-advances-device-context-features-for-zero-trust-security) - [Establish device trust on Android with Okta Device Assurance](https://www.okta.com/blog/product-innovation/establish-device-trust-on-android-with-okta-device-assurance) - [Set Up API Connector Output Fields in the Okta Workflows Connector Builder](https://www.okta.com/blog/product-innovation/workflows-connector-builder-action-outputs) - [SSH is Dead. Long Live SSH: One Million SSH Logins with Okta. Zero SSH Keys.](https://www.okta.com/blog/product-innovation/ssh-is-dead-long-live-ssh-one-million-ssh-logins-with-okta-zero-ssh-keys) - [Go beyond patch management and enforce device compliance with extensible, real-time posture checks](https://www.okta.com/blog/product-innovation/go-beyond-patch-management-and-enforce-device-compliance-with-extensible-real-time) - [Okta Workflows Tutorial: Build a Connector for OpenWeather API](https://www.okta.com/blog/product-innovation/workflows-connector-builder-tutorial) - [Okta Workflows How-To: Six Ways to Trigger a Flow](https://www.okta.com/blog/product-innovation/six-ways-to-trigger-a-flow) - [Okta Workflows How-To: Set Up a Streaming Action Card for Search Results](https://www.okta.com/blog/product-innovation/set-up-a-streaming-action-card-for-search-results) - [Secure Access from Unmanaged Devices with Okta Device Assurance](https://www.okta.com/blog/product-innovation/secure-access-from-unmanaged-devices-with-okta-device-assurance) - [Okta Workflows How-To: Convert an Object to a List](https://www.okta.com/blog/product-innovation/convert-an-object-to-a-list) - [Marketing in a post-cookie world](https://www.okta.com/blog/industry-insights/marketing-in-a-post-cookie-world) - [Okta Applauds New US National Cybersecurity Strategy](https://www.okta.com/blog/industry-insights/okta-applauds-new-us-national-cybersecurity-strategy) - [CDP and CIAM: A match made in cookieless marketing heaven](https://www.okta.com/blog/industry-insights/cdp-and-ciam-a-match-made-in-cookieless-marketing-heaven) - [Organizations moving forward](https://www.okta.com/blog/industry-insights/organizations-moving-forward) - [Four best practices for adopting Okta Identity Engine](https://www.okta.com/blog/industry-insights/4-best-practices-for-adopting-oie) - [Best-of-Breed vs. Suites: Growth of Slack and Zoom Across the Okta Integration Network](https://www.okta.com/blog/industry-insights/best-of-breed-vs-suites-growth-of-slack-and-zoom-across-the-okta-integration-network) - [5 signs to upgrade your small business Identity solution](https://www.okta.com/blog/industry-insights/5-signs-to-upgrade-your-small-business-identity-solution) - [Customer Identity trends report shows control trumps convenience ](https://www.okta.com/blog/industry-insights/customer-identity-trends-report-shows-control-trumps-convenience) - [Nonprofits at Work 2024: Mission-critical tech and security](https://www.okta.com/blog/industry-insights/okta-nonprofit-businesses-at-work-2024) - [Maximizing ROI with Customer Identity: 5 Questions with a guest from Forrester](https://www.okta.com/blog/industry-insights/maximizing-roi-with-customer-identity-5-questions-with-a-guest-from-forrester) - [How to drive growth by modernizing Customer Identity](https://www.okta.com/blog/industry-insights/how-to-drive-growth-by-modernizing-customer-identity) - [All About IT Infrastructure: What it is and How it's Evolving](https://www.okta.com/blog/industry-insights/all-about-it-infrastructure-what-it-is-and-how-its-evolving) - [CCPA vs. GDPR: Similarities and Differences Explained](https://www.okta.com/blog/industry-insights/ccpa-vs-gdpr) - [How Development Teams Purchase SaaS](https://www.okta.com/blog/industry-insights/how-development-teams-purchase-saas) - [What Is Best-of-Breed Technology?](https://www.okta.com/blog/industry-insights/best-of-breed-technology) - [How strong governance can reduce your SaaS spend](https://www.okta.com/blog/industry-insights/how-strong-governance-can-reduce-your-saas-spend) - [More than SSO: Five SaaS features you need to win enterprise customers](https://www.okta.com/blog/industry-insights/more-than-sso-five-saas-features-you-need-to-win-enterprise-customers) - [Financial Services: Upgrade Your UX with a One-Identity Strategy ](https://www.okta.com/blog/industry-insights/financial-services-upgrade-your-ux-with-a-one-identity-strategy) - [Okta Welcomes the Biden-Harris Administration’s Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence](https://www.okta.com/blog/industry-insights/okta-welcomes-the-biden-harris-administrations-executive-order-on-safe-secure-and) - [How Identity gives SMBs a competitive edge](https://www.okta.com/blog/industry-insights/how-identity-gives-smbs-a-competitive-edge) - [Innovation ignited: How to start your digital Identity management journey](https://www.okta.com/blog/industry-insights/innovation-ignited-how-to-start-your-digital-identity-management-journey) - [DORA is coming. Are you ready? ](https://www.okta.com/blog/industry-insights/dora-is-coming-are-you-ready) - [Filling the third-party cookie gap with first-party and zero-party data](https://www.okta.com/blog/industry-insights/filling-the-third-party-cookie-gap-with-first-party-and-zero-party-data) - [PCI DSS 4.0: What financial service providers need to know about new regulatory requirements](https://www.okta.com/blog/industry-insights/pci-dss-4-0-what-financial-service-providers-need-to-know-about-new-regulatory) - [Recapping Cyber and Digital Identity Innovation Capitol Hill Day: Identity takes center stage at the US Capitol](https://www.okta.com/blog/industry-insights/recapping-cyber-and-digital-identity-innovation-capitol-hill-day-identity-takes-center) - [It’s time to look beyond the standard Zero Trust framework](https://www.okta.com/blog/industry-insights/its-time-to-look-beyond-the-standard-zero-trust-framework) - [Digital native businesses: Pioneering the digital landscape securely with CIAM](https://www.okta.com/blog/industry-insights/digital-native-businesses-pioneering-the-digital-landscape-securely-with-ciam) - [In with the Old, in with the New: Adapting Legacy Security Investments for the Modern World](https://www.okta.com/blog/industry-insights/in-with-the-old-in-with-the-new-adapting-legacy-security-investments-for-the-modern) - [What Is an API?](https://www.okta.com/blog/industry-insights/api-application-programming-interface) - [How to innovate under pressure](https://www.okta.com/blog/industry-insights/how-to-innovate-under-pressure) - [It’s official: Zero Trust now favored by 96% of organizations](https://www.okta.com/blog/industry-insights/its-official-zero-trust-now-favored-by-96-of-organizations) - [Risk-based policy-driven security with Device Logout](https://www.okta.com/blog/product-innovation/risk-based-policy-driven-security-with-device-logout) - [Okta leads the way: Driving real-time security with Shared Signals](https://www.okta.com/blog/product-innovation/okta-leads-the-way-driving-real-time-security-with-shared-signals) - [Boosting security with Okta Identity Threat Protection and Workflows](https://www.okta.com/blog/product-innovation/boosting-security-with-okta-identity-threat-protection-and-workflows) - [Okta participates in White House MFA symposium](https://www.okta.com/blog/company-and-culture/okta-participates-in-white-house-mfa-symposium) - [It’s Official: Okta Joins Forces With Auth0](https://www.okta.com/blog/company-and-culture/its-official-okta-joins-forces-with-auth0) - [How Our Core Values Shape Our Identity](https://www.okta.com/blog/company-and-culture/how-our-core-values-shape-our-identity) - [In Celebration of Vittorio Bertocci](https://www.okta.com/blog/company-and-culture/in-celebration-of-vittorio-bertocci) - [Okta Unveils Bold Brand Evolution ](https://www.okta.com/blog/company-and-culture/okta-unveils-bold-brand-evolution) - [Spotlight on Mimoh Das: A journey of resilience and growth with Okta's "What's Next" program](https://www.okta.com/blog/company-and-culture/spotlight-on-mimoh-das-a-journey-of-resilience-and-growth-with-oktas-whats-next) - [It’s here: Okta Launch Week July ‘24](https://www.okta.com/blog/company-and-culture/its-here-okta-launch-week-july-24) - [Okta on Okta: On a mission to enable, evolve, and showcase Okta](https://www.okta.com/blog/company-and-culture/okta-on-okta-on-a-mission-to-enable-evolve-and-showcase-okta) - [Inclusive Language at Okta](https://www.okta.com/blog/company-and-culture/inclusive-language-at-okta) - [Founders in Focus: Karine Mellata of Intrinsic](https://www.okta.com/blog/company-and-culture/founders-in-focus-karine-mellata-of-intrinsic) - [Okta joins the CNCF to shape the future of cloud computing](https://www.okta.com/blog/company-and-culture/okta-joins-the-cncf-to-shape-the-future-of-cloud-computing) - [Introducing “Mistaken Identity,” Okta’s new podcast](https://www.okta.com/blog/company-and-culture/introducing-mistaken-identity-oktas-new-podcast) - [Okta’s climate targets: Progress and opportunities one year in](https://www.okta.com/blog/company-and-culture/oktas-climate-targets-progress-and-opportunities-one-year-in) - [Okta Concludes its Investigation Into the January 2022 Compromise](https://www.okta.com/blog/company-and-culture/okta-concludes-its-investigation-into-the-january-2022-compromise) - [Okta Secure Identity Commitment: 2024 Year in Review | Highlights, Innovations, and What’s Next](https://www.okta.com/blog/company-and-culture/okta-secure-identity-commitment-2024-year-in-review-highlights-innovations-and-whats) - [Okta’s Investigation of the January 2022 Compromise](https://www.okta.com/blog/company-and-culture/oktas-investigation-of-the-january-2022-compromise) - [Introducing the Okta Community virtual Ask Me Anything series](https://www.okta.com/blog/company-and-culture/introducing-the-okta-community-virtual-ask-me-anything-series) - [Nonprofits Should Be As Powerful As Their Missions: Our $10 Million Commitment](https://www.okta.com/blog/company-and-culture/nonprofits-should-be-as-powerful-as-their-missions-our-10-million-commitment) - [Okta and beyond: Building a robust defense against web attacks](https://www.okta.com/blog/company-and-culture/okta-and-beyond) - [Introducing Okta’s FY24 Equity Accelerator cohort](https://www.okta.com/blog/company-and-culture/introducing-oktas-fy24-equity-accelerator-cohort) - [Okta CEO on Workforce Reduction](https://www.okta.com/blog/company-and-culture/message-okta-ceo) - [Launch Week: What’s new for Okta EMEA in Q2](https://www.okta.com/blog/company-and-culture/launch-week-whats-new-for-okta-emea-in-q2) - [Okta’s Commitment to Social and Environmental Responsibility](https://www.okta.com/blog/company-and-culture/oktas-commitment-to-social-and-environmental-responsibility) - [Inside Okta’s new brand campaign](https://www.okta.com/blog/company-and-culture/inside-oktas-new-brand-campaign) - [Recognizing trailblazers: Introducing The Identity 25 by Okta Ventures](https://www.okta.com/blog/company-and-culture/recognizing-trailblazers-introducing-the-identity-25-by-okta-ventures) - [Okta Achieves FedRAMP® High Authorization](https://www.okta.com/blog/company-and-culture/okta-achieves-fedrampr-high-authorization) - [Okta’s climate update: Scaling and building in 2024](https://www.okta.com/blog/company-and-culture/oktas-climate-update-scaling-and-building-in-2024) - [Okta’s Nonprofit Technology Fellowship: Empowering nonprofit technology leaders across the globe](https://www.okta.com/blog/company-and-culture/oktas-nonprofit-technology-fellowship-empowering-nonprofit-technology-leaders-across) - [Okta’s Innovation Lab: Revolutionizing nonprofit collaboration](https://www.okta.com/blog/company-and-culture/oktas-innovation-lab-revolutionizing-nonprofit-collaboration) - [Okta SaaS Startup Competition 2024 results: Showcasing innovation in Identity-driven tech](https://www.okta.com/blog/company-and-culture/okta-saas-startup-competition-2024-results-showcasing-innovation-in-identity-driven) - [Identity Insiders: Basketball coach turned Identity coach Jami Baker](https://www.okta.com/blog/company-and-culture/identity-insiders-basketball-coach-turned-identity-coach-jami-baker) - [What makes Okta one of the Best Workplaces in Tech? ](https://www.okta.com/blog/company-and-culture/what-makes-okta-one-of-the-best-workplaces-in-tech) - [Leading the way: Commemorating the establishment of our first Latinx Employee Network](https://www.okta.com/blog/company-and-culture/leading-the-way-commemorating-the-establishment-of-our-first-latinx-employee-network) - [Okta Celebrates International Transgender Day of Visibility with New Guide for Employees and Leaders](https://www.okta.com/blog/company-and-culture/okta-celebrates-international-transgender-day-of-visibility-with-new-guide) - [Okta For Good Innovation Lab: See how technology is enabling social progress](https://www.okta.com/blog/company-and-culture/okta-for-good-innovation-lab-see-how-technology-is-enabling-social-progress) - [Inside Okta: A summer of growth and connection at the Dublin office](https://www.okta.com/blog/company-and-culture/inside-okta-a-summer-of-growth-and-connection-at-the-dublin-office) - [Okta Commits to Climate Action with Approved Science-Based Targets](https://www.okta.com/blog/company-and-culture/okta-commits-to-climate-action) - [Q&A with Neville Vincent: Meet Okta’s Vice President, Asia](https://www.okta.com/blog/company-and-culture/qa-with-neville-vincent-meet-oktas-vice-president-asia) - [Enhancing security: Identity proofing for new hires](https://www.okta.com/blog/industry-insights/enhancing-security-identity-proofing-for-new-hires) - [To Enhance Patient Outcomes, Healthcare Providers Need to Invest in Digital Experiences](https://www.okta.com/blog/industry-insights/to-enhance-patient-outcomes-healthcare-providers-need-to-invest-in-digital-experiences) - [What is NLP?](https://www.okta.com/blog/industry-insights/what-is-nlp) - [Top 3 actions for technologists to help maximize the value of your business’ cybersecurity insurance](https://www.okta.com/blog/industry-insights/top-3-actions-for-technologists-to-help-maximize-the-value-of-your-business) - [SMB Identity buyer's checklist](https://www.okta.com/blog/industry-insights/smb-identity-buyers-checklist) - [SMBs at Work 2024: How are SMBs implementing security? We have answers. ](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-how-are-smbs-implementing-security-we-have-answers) - [The hidden challenges of business partner access: How to stay secure and agile at scale](https://www.okta.com/blog/industry-insights/the-hidden-challenges-of-business-partner-access-how-to-stay-secure-and-agile) - [What the Tools Marketers Use Can Tell Us About This Current Moment ](https://www.okta.com/blog/industry-insights/what-the-tools-marketers-use-can-tell-us-about-this-current-moment) - [What is a Domain Name System (DNS)?](https://www.okta.com/blog/industry-insights/what-is-a-domain-name-system-dns) - [Time to Make a Work from Home Policy. Where Should You Start?](https://www.okta.com/blog/industry-insights/work-from-home-policy-guidelines-and-best-practices) - [State of Enterprise App Marketplaces: Learnings from a Milestone Anniversary](https://www.okta.com/blog/industry-insights/state-of-enterprise-app-marketplaces-learnings-from-a-milestone-anniversary) - [SMBs at Work 2024: Where SMBs are leading the way in automation](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-where-smbs-are-leading-the-way-in-automation) - [SMBs at Work 2024: Which apps are powering today’s growing companies?](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-which-apps-are-powering-todays-growing-companies) - [Identity: Free the people who power your business](https://www.okta.com/blog/industry-insights/identity-free-the-people-who-power-your-business) - [What is zero-party data and why does it matter now?](https://www.okta.com/blog/industry-insights/what-is-zero-party-data-and-why-does-it-matter-now) - [New Forrester study reveals: Okta Identity Governance can result in 211% ROI](https://www.okta.com/blog/industry-insights/new-forrester-study-reveals-okta-identity-governance-can-result-in-211-roi) - [Why Identity fuels speed for SMBs](https://www.okta.com/blog/industry-insights/why-identity-fuels-speed-for-smbs) - [How modern identity strategies shape enterprise security](https://www.okta.com/blog/industry-insights/how-modern-identity-strategies-shape-enterprise-security) - [SMBs at Work 2024: What apps make the SMB stack?](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-what-apps-make-the-smb-stack) - [What Is Privileged Access Management?](https://www.okta.com/blog/industry-insights/what-is-privileged-access-management) - [Why Identity is the I in… High Impact Service Providers](https://www.okta.com/blog/industry-insights/why-identity-is-the-i-in-high-impact-service-providers) - [The future of farming hinges on digital access](https://www.okta.com/blog/industry-insights/the-future-of-farming-hinges-on-digital-access) - [Why now is the time for IAM transformation in banking](https://www.okta.com/blog/industry-insights/why-now-is-the-time-for-iam-transformation-in-banking) - [What you might not know about conversion rate optimization](https://www.okta.com/blog/industry-insights/what-you-might-not-know-about-conversion-rate-optimization) - [Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?](https://www.okta.com/blog/industry-insights/two-factor-authentication-vs-multi-factor-authentication-what-are-the-risks) - [Zero-party data and the future of personalization](https://www.okta.com/blog/industry-insights/zero-party-data-and-the-future-of-personalization) - [The Adaptability Imperative: Executives anticipate the unexpected for 2024 and beyond](https://www.okta.com/blog/industry-insights/the-adaptability-imperative-executives-anticipate-the-unexpected-for-2024-and-beyond) - [Predictions on Identity’s role in 2024 from Okta Ventures portfolio leaders](https://www.okta.com/blog/industry-insights/predictions-on-identitys-role-in-2024-from-okta-ventures-portfolio-leaders) - [What is machine learning?](https://www.okta.com/blog/industry-insights/what-is-machine-learning) - [Website personalization: Personalizing experiences without third-party cookies](https://www.okta.com/blog/industry-insights/website-personalization-personalizing-experiences-without-third-party-cookies) - [Why Identity is the I in… Human-centered design](https://www.okta.com/blog/industry-insights/why-identity-is-the-i-in-human-centered-design) - [New ways to implement least privilege with Okta Workforce Identity](https://www.okta.com/blog/industry-insights/new-ways-to-implement-least-privilege-with-okta-workforce-identity) - [What Is a Data Breach?](https://www.okta.com/blog/industry-insights/data-breach) - [The quest for Workforce Identity maturity](https://www.okta.com/blog/industry-insights/the-quest-for-workforce-identity-maturity) - [Why Identity is the I in… Time Tax](https://www.okta.com/blog/industry-insights/why-identity-is-the-i-in-time-tax) - [What Is Infrastructure as a Service (IaaS)?](https://www.okta.com/blog/industry-insights/what-is-infrastructure-as-a-service-iaas) - [What Are the Benefits and Limitations of Multi-Cloud?](https://www.okta.com/blog/industry-insights/what-are-the-benefits-and-limitations-of-multi-cloud) - [Why healthcare organizations should invest in Identity now more than ever](https://www.okta.com/blog/industry-insights/why-healthcare-organizations-should-invest-in-identity-now-more-than-ever) - [What's top of mind for IT leaders in 2023](https://www.okta.com/blog/industry-insights/whats-top-of-mind-for-it-leaders-in-2023) - [Okta named a Leader in Forrester Wave™: Workforce Identity Platforms, Q1 2024](https://www.okta.com/blog/industry-insights/okta-named-a-leader-in-forrester-wavetm-workforce-identity-platforms-q1-2024) - [Open banking regulation in North America: A guide](https://www.okta.com/blog/industry-insights/open-banking-regulation-in-north-america-a-guide) - [Restoring Confidence in Financial Services with Identity](https://www.okta.com/blog/industry-insights/restoring-confidence-in-financial-services-with-identity) - [KuppingerCole ranks Okta as an Overall Leader in CIAM platforms](https://www.okta.com/blog/industry-insights/kuppingercole-ranks-okta-as-an-overall-leader-in-ciam-platforms) - [Okta applauds new cybersecurity executive order](https://www.okta.com/blog/industry-insights/okta-applauds-new-cybersecurity-executive-order) - [Okta named a Leader in Gartner® Access Management Magic Quadrant™ for the 7th consecutive year](https://www.okta.com/blog/industry-insights/okta-named-leader-in-gartner-access-management-magic-quadrant-for-7th-year) - [Okta named a Leader in Gartner® Magic Quadrant™ for Access Management for the 8th year in a row](https://www.okta.com/blog/industry-insights/okta-named-a-leader-in-gartner-magic-quadrant-for-access-management-for-8th-year) - [7 Key Data Privacy Laws for 2023](https://www.okta.com/blog/industry-insights/privacy-laws) - [Okta connectors in action: The Active Cyber Trust Portal](https://www.okta.com/blog/customers-and-partners/okta-connectors-in-action-the-active-cyber-trust-portal) - [Okta for US Military: A New milestone in DoD IL4 Identity](https://www.okta.com/blog/customers-and-partners/okta-for-us-military-a-new-milestone-in-dod-il4-identity) - [Okta and Google Chrome Enterprise: Innovating to secure the enterprise browser](https://www.okta.com/blog/customers-and-partners/okta-and-google-chrome-enterprise-innovating-to-secure-the-enterprise-browser) - [Okta Identity Management: The Secret to Self-Service IT at Workday](https://www.okta.com/blog/customers-and-partners/okta-identity-management-the-secret-to-self-service-it-at-workday) - [Okta for Global 2000: Agile Identity for the world's largest public companies](https://www.okta.com/blog/customers-and-partners/okta-for-global-2000-agile-identity-for-the-worlds-largest-public-companies) - [Reducing costs with Okta Workflows: The Wyndham Hotels and Resorts experience](https://www.okta.com/blog/customers-and-partners/reducing-costs-with-okta-workflows-the-wyndham-hotels-and-resorts-experience) - [Yubico FIDO Pre-reg with Okta makes passwordless onboarding easy](https://www.okta.com/blog/customers-and-partners/yubico-and-okta-easy-passwordless-onboarding-with-fido-pre-reg) - [Jamf and Okta: Identity management that innovates with Apple](https://www.okta.com/blog/customers-and-partners/jamf-and-okta-identity-management-that-innovates-with-apple) - [Meet the Experts: Elevating efficiency and security with multi-tenancy](https://www.okta.com/blog/customers-and-partners/meet-the-experts-elevating-efficiency-and-security-with-multi-tenancy) - [How Identity empowers prosperity for micro-retailers](https://www.okta.com/blog/customers-and-partners/identity-empowers-prosperity-for-micro-retailers) - [Using Login.gov as a Custom Identity Verification and Authentication Service in Okta](https://www.okta.com/blog/customers-and-partners/using-login-gov-as-a-custom-identity-verification-and-authentication-service-in-okta) - [Wealthsimple cuts app access wait time from 48-plus hours to one hour with Okta](https://www.okta.com/blog/customers-and-partners/wealthsimple-cuts-app-access-wait-time-from-48-plus-hours-to-one-hour-with-okta) - [Okta Partner Awards: Celebrating our 2024 Partner Award winners](https://www.okta.com/blog/customers-and-partners/okta-partner-awards-celebrating-our-2024-partner-award-winners) - [Okta and AWS Partner to Simplify Access Via Session Tags](https://www.okta.com/blog/customers-and-partners/okta-and-aws-partner-to-simplify-access-via-session-tags) - [Okta and Zylo Bring SaaS Management Integration](https://www.okta.com/blog/customers-and-partners/okta-and-zylo-bring-saas-management-integration) - [NTT DATA accelerates onboarding and simplifies M&A with Okta Workflows](https://www.okta.com/blog/customers-and-partners/ntt-data-accelerates-onboarding-and-simplifies-ma-with-okta-workflows) - [Okta wins AWS Global Marketplace Partner of the Year](https://www.okta.com/blog/customers-and-partners/okta-wins-aws-global-marketplace-partner-of-the-year) - [Zero Trust Secures Nonprofits’ Links to Clients, Staff, and Volunteers](https://www.okta.com/blog/customers-and-partners/zero-trust-secures-nonprofits-links-to-clients-staff-and-volunteers) - [Okta and Hiring Our Heroes: Empowering veterans through the Department of Defense’s SkillBridge](https://www.okta.com/blog/customers-and-partners/okta-and-hiring-our-heroes-empowering-veterans-through-the-department-of-defenses) - [Okta awarded the Palo Alto Networks 2023 Global Technology Partner Innovator of the Year](https://www.okta.com/blog/customers-and-partners/okta-awarded-the-palo-alto-networks-2023-global-technology-partner-innovator-of-the) - [Okta and Google Workspace are Improving Enterprise Security](https://www.okta.com/blog/customers-and-partners/okta-and-google-workspace-are-improving-enterprise-security) - [Kickstart Amazon Bedrock with Auth0 by Okta](https://www.okta.com/blog/customers-and-partners/kickstart-amazon-bedrock-with-auth0-by-okta) - [How Identity Serves the Total Army Zero Trust Strategy](https://www.okta.com/blog/customers-and-partners/how-identity-serves-the-total-army-zero-trust-strategy) - [Secure User Identities in Your Zoom Calls — Authenticated by Okta](https://www.okta.com/blog/customers-and-partners/secure-user-identities-in-your-zoom-calls-authenticated-by-okta) - [Streamlining workflows to create clinician efficiency with Identity](https://www.okta.com/blog/customers-and-partners/streamlining-workflows-to-create-clinician-efficiency-with-identity) - [Okta Partner Awards: Celebrating our global 2023 winners](https://www.okta.com/blog/customers-and-partners/okta-partner-awards-celebrating-our-global-2023-winners) - [Okta connectors in action: iC Consult’s Oracle EBS connector](https://www.okta.com/blog/customers-and-partners/okta-connectors-in-action-ic-consults-oracle-ebs-connector) - [Okta integrates with Singapore’s national digital ID system](https://www.okta.com/blog/customers-and-partners/okta-integrates-with-singapores-national-digital-id-system) - [Schuberg Philis saves 6,000+ hours of engineering time by automating with Okta Workflows](https://www.okta.com/blog/customers-and-partners/schuberg-philis-saves-6000-hours-of-engineering-time-by-automating-with-okta-workflows) - [Airtable sustainably scales automation with low-code Okta Workflows](https://www.okta.com/blog/customers-and-partners/airtable-sustainably-scales-automation-with-low-code-okta-workflows) - [Implementation services: The key to nonprofit digital transformation](https://www.okta.com/blog/customers-and-partners/implementation-services-the-key-to-nonprofit-digital-transformation) - [How Mars Leveraged Identity to Protect Sensitive Content and Applications](https://www.okta.com/blog/customers-and-partners/how-mars-leveraged-identity-to-protect-sensitive-content-and-applications) - [How nonprofits achieve their missions while delivering secure digital experiences](https://www.okta.com/blog/customers-and-partners/how-nonprofits-achieve-their-missions-while-delivering-secure-digital-experiences) - [Top Organizations Are Automating Identity With Okta Workflows](https://www.okta.com/blog/customers-and-partners/top-organizations-are-automating-identity-with-okta-workflows) - [How The Trevor Project saves 5,500 hours and $300K each year with Okta Workflows](https://www.okta.com/blog/customers-and-partners/how-the-trevor-project-saves-5500-hours-and-300k-each-year-with-okta-workflows) - [Unlock government efficiency at the Okta Gov Identity Summit 2025](https://www.okta.com/blog/customers-and-partners/unlock-government-efficiency-at-the-okta-gov-identity-summit-2025) - [Measuring the business value of Identity at Guaranteed Rate and ADT](https://www.okta.com/blog/customers-and-partners/measuring-the-business-value-of-identity-at-guaranteed-rate-and-adt) - [Tactical Identity Bridge Appliance: How the U.S. Government can extend Okta to the tactical edge](https://www.okta.com/blog/customers-and-partners/how-the-u-s-government-can-extend-okta-to-the-tactical-edge) - [Smart money: transforming financial services with Okta and AWS](https://www.okta.com/blog/customers-and-partners/smart-money-transforming-financial-services-with-okta-and-aws) - [Managed Identity solutions providers and BeyondID’s 3 value pillars ](https://www.okta.com/blog/customers-and-partners/managed-identity-solutions-providers-and-beyondids-3-value-pillars) - [How athenahealth Created a Secure, Scalable Healthcare Ecosystem](https://www.okta.com/blog/customers-and-partners/how-athenahealth-created-a-secure-scalable-healthcare-ecosystem) - [New Okta and Yubico integration delivers phishing-resistant authentication at enterprise scale](https://www.okta.com/blog/customers-and-partners/new-okta-and-yubico-integration-delivers-phishing-resistant-authentication-at) - [The fed gov needs Workforce Identity — three reasons why](https://www.okta.com/blog/customers-and-partners/the-fed-gov-needs-workforce-identity-three-reasons-why) - [Identity for impact: Follow three nonprofits on their journeys with Okta’s Innovation Lab](https://www.okta.com/blog/customers-and-partners/identity-for-impact-follow-three-nonprofits-on-their-journeys-with-oktas-innovation) - [Okta Wins Google Cloud Technology Partner of the Year Award for Productivity and Collaboration: Impact](https://www.okta.com/blog/customers-and-partners/okta-wins-google-cloud-technology-partner-of-the-year-award-for-productivity-and) - [Okta joins Google Cloud and industry leaders to build an open, secure AI ecosystem with MCP](https://www.okta.com/blog/ai/securing-the-ai-agent-ecosystem) - [Securely step into the AI era with AWS and Okta](https://www.okta.com/blog/ai/securely-step-into-the-ai-era-with-aws-and-okta) - [Identity Threat Protection with Okta AI is transforming security](https://www.okta.com/blog/ai/identity-threat-protection-with-okta-ai-is-transforming-security) - [Introducing Log Investigator: Transform your security operations with AI-powered log analysis](https://www.okta.com/blog/ai/introducing-log-investigator-transform-your-security-operations-with-ai-powered-log) - [Okta unveils responsible AI principles](https://www.okta.com/blog/ai/okta-unveils-responsible-ai-principles) - [Identity Threat Protection with Okta AI is Generally Available](https://www.okta.com/blog/ai/identity-threat-protection-with-okta-ai-is-generally-available) - [Transforming enterprise operations with Okta Workflows and OpenAI](https://www.okta.com/blog/ai/transforming-enterprise-operations-with-okta-workflows-and-openai) - [AI at Work 2024: A view from the C-suite](https://www.okta.com/blog/ai/ai-at-work-2024-a-view-from-the-c-suite) - [How AI impacts the SMB threat landscape](https://www.okta.com/blog/ai/how-ai-impacts-the-smb-threat-landscape) - [What is AI?](https://www.okta.com/blog/ai/what-is-ai) - [Identity Threat Protection with Okta AI](https://www.okta.com/blog/ai/identity-threat-protection-with-okta-ai) - [Oktane 2023: Go beyond with AI and Identity](https://www.okta.com/blog/ai/oktane-2023-go-beyond-with-ai-and-identity) - [Artificial Intelligence for public good](https://www.okta.com/blog/ai/artificial-intelligence-for-public-good) - [Unlocking the power of generative AI with Identity](https://www.okta.com/blog/ai/unlocking-the-power-of-generative-ai-with-identity) - [Responsible AI innovation at Okta](https://www.okta.com/blog/ai/responsible-ai-innovation-at-okta) - [What the GenAI paradigm shift means for Identity](https://www.okta.com/blog/ai/what-the-genai-paradigm-shift-means-for-identity) - [Use AI to Describe What an Okta Workflows Identity Automation Does](https://www.okta.com/blog/ai/ai-describe-workflows-automation) - [AI Is Changing Security—Here’s How](https://www.okta.com/blog/ai/ai-is-changing-security-heres-how) - [Okta helps secure AI agent identity](https://www.okta.com/blog/ai/okta-helps-secure-ai-agent-identity) - [Secure non-human identities with Okta’s unified platform](https://www.okta.com/blog/ai/secure-non-human-identities-with-oktas-unified-platform) - [How Okta Ventures supports startups with integrations to drive enterprise readiness](https://www.okta.com/blog/customers-and-partners/how-okta-ventures-supports-startups-with-integrations-to-drive-enterprise-readiness) - [Simplify identity management in higher education with Okta and AWS](https://www.okta.com/blog/customers-and-partners/simplify-identity-management-in-higher-education-with-okta-and-aws) - [Identity Insider: Zareen Erskine, FinMkt](https://www.okta.com/blog/customers-and-partners/identity-insider-zareen-erskine-finmkt) - [Announcing the 2025 Identity 25: Highlighting a community of digital Identity trailblazers](https://www.okta.com/blog/customers-and-partners/announcing-the-2025-identity-25-highlighting-a-community-of-digital-identity) - [How Okta and Palo Alto Networks forge an identity-powered security defense system](https://www.okta.com/blog/customers-and-partners/how-okta-and-palo-alto-networks-forge-an-identity-powered-security) - [IT leader translates Okta Workflows into business value](https://www.okta.com/blog/customers-and-partners/it-leader-translates-okta-workflows-into-business-value) - [Identity 25 U.S. Public Sector honorees: Part 1, MVPs of digital services and fraud defenses](https://www.okta.com/blog/customers-and-partners/identity-25-u-s-public-sector-honorees-part-1-mvps-of-digital-services-and-fraud) - [Leveling up: Achieving Okta professional certification](https://www.okta.com/blog/customers-and-partners/leveling-up-achieving-okta-professional-certification) - [Bridging the gap in browser security with Google and Okta](https://www.okta.com/blog/customers-and-partners/bridging-the-gap-in-browser-security-with-google-and-okta) - [Okta Ventures Request for Builders: Five key focus areas in Identity and security](https://www.okta.com/blog/customers-and-partners/okta-ventures-request-for-builders-five-key-focus-areas-in-identity-and-security) - [How Okta helps New York financial service companies comply with new MFA requirements](https://www.okta.com/blog/customers-and-partners/how-okta-helps-new-york-financial-service-companies-comply-with-new-mfa-requirements) - [Identity 25 U.S. Public Sector honorees: Part 2, Bridging academic innovation and government implementation](https://www.okta.com/blog/customers-and-partners/identity-25-u-s-public-sector-honorees-part-2-bridging-academic-innovation-and) - [Why the future of security depends on verifiable identity](https://www.okta.com/blog/identity-security/why-the-future-of-security-depends-on-verifiable-identity) - [5 tips to help secure OAuth and OpenID Connect tokens](https://www.okta.com/blog/product-innovation/5-tips-to-help-secure-oauth-and-openid-connect-tokens) - [Identity is the target](https://www.okta.com/blog/product-innovation/identity-is-the-target) - [Okta’s modern IGA solution, now part of the identity security fabric for government](https://www.okta.com/blog/product-innovation/okta-iga-for-federal-identity-security-fabric) - [Okta welcomes US DoD and mission partners to Okta Identity Governance, Workflows, and AI](https://www.okta.com/blog/product-innovation/okta-welcomes-dod-and-mission-partners-to-iga-workflows-ai) - [Elevating Okta Workflows observability: Execution Log Streaming and Execution History Inspector now Generally Available](https://www.okta.com/blog/product-innovation/elevating-okta-workflows-observability--execution-log-streaming) - [The business value of verifiable digital credentials: 3 practical use cases](https://www.okta.com/blog/identity-security/the-business-value-of-verifiable-digital-credentials) - [Unified Requester Experience: Your one-stop shop for Access Requests](https://www.okta.com/blog/product-innovation/unified-requester-experience-your-one-stop-shop-for-access-requests) - [Request for builders: Six key focus areas in Identity ](https://www.okta.com/blog/industry-insights/request-for-builders-six-key-focus-areas-in-identity) - [Okta Partners with DigitalOcean, Netlify, and Vercel to Simplify Identity for Developers](https://www.okta.com/blog/customers-and-partners/okta-partners-to-simplify-identity) - [Your security tools aren't talking. Attackers love that.](https://www.okta.com/blog/identity-security/identity-security-fabric-for-the-modern-threat-landscape) - [Passkeys: The key to a passwordless future](https://www.okta.com/blog/identity-security/passkeys--the-key-to-a-passwordless-future) - [A technical overview of the verifiable digital credentials ecosystem](https://www.okta.com/blog/identity-security/technical-overview-of-verifiable-digital-credentials-ecosystem) - [Beyond ID’s top identity threats in 2025](https://www.okta.com/blog/customers-and-partners/beyond-id-s-top-identity-threats-in-2025) - [Verifiable digital credentials explained: How they work and why they matter](https://www.okta.com/blog/identity-security/verifiable-digital-credentials-explained) - [Securing serverless AI agents and MCP servers on AWS with Okta](https://www.okta.com/blog/ai/securing-serverless-ai-agents-and-mcp-servers-on-aws-with-okta) - [Bridging past and future: How identity enables EDUCAUSE's vision of restored trust](https://www.okta.com/blog/customers-and-partners/bridging-past-and-future--how-identity-enables-educauses-vision) - [Identity security 101: How to drive trust and loyalty across the user journey](https://www.okta.com/blog/identity-security/identity-security-101-how-to-drive-trust-and-loyalty-across-the-user-journey) - [Back to school: Navigating the rising Identity security challenges in higher education](https://www.okta.com/blog/industry-insights/back-to-school-navigating-the-rising-identity-security-challenges-in-higher-education) - [Okta’s mission to standardize Identity Security](https://www.okta.com/blog/identity-security/oktas-mission-to-standardize-identity-security) - [Building AI-ready identity security with Okta Identity Security Posture Management](https://www.okta.com/blog/ai/building-ai-ready-identity-security-with-okta-identity-security-posture-management) - [How Okta mitigates OWASP’s Top 10 Non-Human Identity Risks](https://www.okta.com/blog/ai/how-okta-mitigates-owasps-top-10-non-human-identity-risks) - [Non-human and human identities: A unified approach](https://www.okta.com/blog/ai/non-human-and-human-identities-a-unified-approach) - [Partnership built on innovation and trust](https://www.okta.com/blog/customers-and-partners/partnership-built-on-innovation-and-trust) - [Navigating the future of security at Oktane](https://www.okta.com/blog/customers-and-partners/navigating-the-future-of-security-at-oktane) - [Generative and agentic AI: A security perspective with Okta](https://www.okta.com/blog/ai/generative-and-agentic-ai--a-security-perspective-with-okta) - [Launch Week ‘25: Oktane edition](https://www.okta.com/blog/product-innovation/launch-week-oktane-edition-september25) - [AI agents are everywhere. Is your business ready?](https://www.okta.com/blog/ai/preparing-for-ai-agents) - [The Salesloft incident: Why Identity Security Posture Management matters](https://www.okta.com/blog/industry-insights/salesloft-incident-and-identity-security-posture-management) - [Your guide to modern identity governance](https://www.okta.com/blog/industry-insights/your-guide-to-modern-identity-governance) - [Fast, policy-driven access requests without the manual headaches](https://www.okta.com/blog/industry-insights/fast--policy-driven-access-requests-without-the-manual-headaches) - [Scaling identity lifecycle with Okta Identity Governance](https://www.okta.com/blog/industry-insights/scaling-identity-lifecycle-with-okta-identity-governance) - [I didn’t plan on a career in sales – Here’s why I love it at Okta](https://www.okta.com/blog/company-and-culture/why-i-love-my-sales-career-at-okta) - [Provisioning made simple with Okta Identity Governance](https://www.okta.com/blog/industry-insights/provisioning-made-simple-with-okta-identity-governance) - [Modernizing access reviews with Okta](https://www.okta.com/blog/industry-insights/modernizing-access-reviews-with-okta) - [Our proactive security journey: Adopting Okta Identity Threat Protection](https://www.okta.com/blog/product-innovation/adopting-okta-identity-threat-protection) - [Merging identity with macOS onboarding](https://www.okta.com/blog/product-innovation/merging-identity-with-macos-onboarding) - [Expanding nonprofit access to Okta products](https://www.okta.com/blog/company-and-culture/expanding-nonprofit-access-to-okta-products) - [Breaking the glass ceiling: The power of tech talks for women in tech](https://www.okta.com/blog/company-and-culture/breaking-the-glass-ceiling-the-power-of-tech-talks-for-women-in-tech) - [Keys to high-quality service releases at Okta](https://www.okta.com/blog/company-and-culture/keys-to-high-quality-service-releases-at-okta) - [Empowering encounters: Celebrating women in engineering](https://www.okta.com/blog/company-and-culture/empowering-encounters-celebrating-women-in-engineering) - [Unlocking success: How mentorship empowers engineers](https://www.okta.com/blog/company-and-culture/unlocking-success-how-mentorship-empowers-engineers) - [QA chronicles: Safeguarding the quality of Generally Available features](https://www.okta.com/blog/company-and-culture/qa-chronicles-safeguarding-the-quality-of-generally-available-features) - [Evolving Okta’s edge infrastructure](https://www.okta.com/blog/company-and-culture/evolving-oktas-edge-infrastructure) - [A Brief Overview of Testing at Okta](https://www.okta.com/blog/company-and-culture/a-brief-overview-of-testing-at-okta) - [WebAuthn: Growth and challenges](https://www.okta.com/blog/identity-security/webauthn-growth-and-challenges) - [Phishing resistance in unmanaged iOS devices](https://www.okta.com/blog/identity-security/phishing-resistance-in-unmanaged-ios-devices) - [Phishing-resistant MFA shows great momentum](https://www.okta.com/blog/identity-security/phishing-resistant-mfa-shows-great-momentum) - [Automated defense against Identity-based attacks](https://www.okta.com/blog/identity-security/automated-defense-against-identity-based-attacks) - [Unifying efforts, amplifying security: Shared Signals interoperability](https://www.okta.com/blog/identity-security/unifying-efforts-amplifying-security-shared-signals-interoperability) - [Navigating credential and fraud risks: The phishing resistance authenticator effect](https://www.okta.com/blog/identity-security/navigating-credential-and-fraud-risks-the-phishing-resistance-authenticator-effect) - [Buy v. Build: Advice from a CTO](https://www.okta.com/blog/industry-insights/buy-v-build-advice-from-a-cto) - [Highly efficient data ingestion with the Snowpipe Streaming API](https://www.okta.com/blog/product-innovation/highly-efficient-data-ingestion-with-the-snowpipe-streaming-api) - [Okta and Google Chrome Enterprise: Enhanced application protections with device assurance](https://www.okta.com/blog/product-innovation/okta-and-google-chrome-enterprise-enhanced-application-protections-with-device) - [Improving the end-user registration experience with Okta Identity Engine](https://www.okta.com/blog/product-innovation/improving-the-end-user-registration-experience-with-okta-identity-engine) - [Bootstrapping Okta FastPass enrollment in a phishing-resistant manner](https://www.okta.com/blog/product-innovation/bootstrapping-okta-fastpass-enrollment-in-a-phishing-resistant-manner) - [Why we sunset the Okta Verify watch app](https://www.okta.com/blog/product-innovation/why-we-sunset-the-okta-verify-watch-app) - [A Deep Dive Into Okta FastPass](https://www.okta.com/blog/product-innovation/a-deep-dive-into-okta-fastpass) - [Why Okta Verify protects your identity by pinning TLS connections](https://www.okta.com/blog/product-innovation/why-okta-verify-protects-your-identity-by-pinning-tls-connections) - [Context re-evaluation with FastPass](https://www.okta.com/blog/product-innovation/context-re-evaluation-with-fastpass) - [Migrating off legacy Tokio at scale](https://www.okta.com/blog/product-innovation/migrating-off-legacy-tokio-at-scale) - [Desktop password sync: Unlock the benefits of platform SSO for macOS](https://www.okta.com/blog/product-innovation/desktop-password-sync-unlock-the-benefits-of-platform-sso-for-macos) - [How Okta uses machine learning to automatically detect and mitigate toll fraud](https://www.okta.com/blog/product-innovation/how-okta-uses-machine-learning-to-automatically-detect-and-mitigate-toll-fraud) - [Achieve Enhanced Secure Authentication with Okta FastPass and CrowdStrike](https://www.okta.com/blog/product-innovation/achieve-enhanced-secure-authentication-with-okta-fastpass-and-crowdstrike) - [Behind the scenes at Access Requests: Worker tasks](https://www.okta.com/blog/product-innovation/behind-the-scenes-at-access-requests-worker-tasks) - [Implementing security best practices in Okta developer orgs](https://www.okta.com/blog/product-innovation/implementing-security-best-practices-in-okta-developer-orgs) - [AutoGuardian: How Okta solved flaky tests](https://www.okta.com/blog/product-innovation/autoguardian-how-okta-solved-flaky-tests) - [Announcing Okta Identity Governance for Customer Identity](https://www.okta.com/blog/product-innovation/announcing-okta-identity-governance-for-customer-identity) - [Restoring the promise: How identity transforms EDUCAUSE's vision into reality](https://www.okta.com/blog/company-and-culture/restoring-the-promise-how-identity-transforms-educauses-vision) - [Simplifying the Complexities of B2B Collaboration](https://www.okta.com/blog/product-innovation/simplifying-the-complexities-of-b2b-collaboration) - [End-to-end visibility for governance and compliance](https://www.okta.com/blog/industry-insights/end-to-end-visibility-for-governance-and-compliance) - [Simplifying Role-Based Access Control at scale](https://www.okta.com/blog/industry-insights/simplifying-role-based-access-control-at-scale) - [What I didn’t expect to learn at Okta (but needed most)](https://www.okta.com/blog/company-and-culture/what-i-didnt-expect-to-learn-at-okta-but-needed-most) - [Designing a resilient identity security fabric with Okta](https://www.okta.com/blog/identity-security/designing-a-resilient-identity-security-fabric-with-okta) - [Automating partner access with Okta Workflows and Realms](https://www.okta.com/blog/industry-insights/automating-partner-access-with-okta-workflows-and-realms) - [Interning with Okta’s Productivity Engineering team](https://www.okta.com/blog/company-and-culture/interning-with-okta-s-productivity-engineering-team) - [Identity Threat Protection Detections now available for Adaptive MFA Super Admins](https://www.okta.com/blog/product-innovation/identity-threat-protection-detections-now-available-for-adaptive) - [Why entitlement management needs a modern take](https://www.okta.com/blog/industry-insights/why-entitlement-management-needs-a-modern-take) ## Newsroom - [Newsroom](https://www.okta.com/newsroom) — The Okta Newsroom keeps you informed about the biggest developments in identity and security, from company news to industry insights and product innovation. ## Newsroom Post - [Okta Ventures unveils the Identity 25 to honor pioneers shaping the future of digital identity](https://www.okta.com/newsroom/press-releases/okta-ventures-unveils-the-identity-25-to-honor-pioneers-shaping-the) - [NetHope and Okta: Securing digital protection and cybersecurity for nonprofits worldwide](https://www.okta.com/newsroom/press-releases/nethope-and-okta-securing-digital-protection-and-cybersecurity-for) - [Savex teams with Okta to accelerate adoption of digital identity in India](https://www.okta.com/newsroom/press-releases/savex-teams-with-okta-to-accelerate-adoption-of-digital-identity-in-india) - [Okta named a Leader in 2024 Gartner® Magic Quadrant™ for Access Management for eighth consecutive year](https://www.okta.com/newsroom/press-releases/okta-named-a-leader-in-2024-gartner-magic-quadrant) - [Okta, OpenID Foundation, and tech firms tackle today’s biggest cybersecurity challenge: Identity security in SaaS apps](https://www.okta.com/newsroom/press-releases/okta-openid-foundation-tech-firms-tackle-todays-biggest-cybersecurity) - [Okta for Good launches new grant portfolio to improve cybersecurity for nonprofits](https://www.okta.com/newsroom/press-releases/okta-for-good-launches-new-grant-portfolio-to-improve-cybersecurity-for) - [Auth0 takes “free for developers” to a new level with more users, more security, free MFA and passwordless](https://www.okta.com/newsroom/press-releases/auth0-takes-free-for-developers-to-a-new-level-with-more-users-more) - [Okta introduces Okta Device Access to help organizations mature their Zero Trust strategy](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-device-access-to-help-organizations-mature-their) - [Okta appoints Eric Kelleher as President and Chief Operating Officer](https://www.okta.com/newsroom/press-releases/okta-appoints-eric-kelleher-as-president-and-chief-operating-officer) - [Okta strengthens go-to-market leadership with executive appointments](https://www.okta.com/newsroom/press-releases/okta-strengthens-go-to-market-leadership-with-executive-appointments) - [Okta, CrowdStrike, Netskope, and Proofpoint join together to secure remote work](https://www.okta.com/newsroom/press-releases/okta-crowdstrike-netskope-and-proofpoint-join-together-to-secure-remote-work) - [Okta unveils updated availability for Okta Workflows as new standalone offering with expanded capabilities](https://www.okta.com/newsroom/press-releases/okta-unveils-updated-availability-for-okta-workflows-as-new-standalone) - [Okta launches passkey support to help enterprises unlock a passwordless future](https://www.okta.com/newsroom/press-releases/okta-launches-passkey-support-to-help-enterprises-unlock-a-passwordless) - [Okta for Government High achieves FedRAMP High authorization](https://www.okta.com/newsroom/press-releases/okta-for-government-high-achieves-fedramp-high-authorization) - [Use of multi-factor authentication (MFA) nearly doubles since 2020, new Okta Secure Sign-In Trends Report finds](https://www.okta.com/newsroom/press-releases/use-of-multi-factor-authentication-mfa-nearly-doubles-since-2020-new-okta) - [Okta sponsors firstboard.io to support talent diversification at the highest levels](https://www.okta.com/newsroom/press-releases/okta-sponsors-firstboard-io-to-support-talent-diversification) - [Okta introduces innovations to help companies harden their security posture and protect sensitive transactions](https://www.okta.com/newsroom/press-releases/okta-introduces-innovations-to-help-companies-harden-their-security) - [Okta named a Leader in 2023 Gartner® Magic Quadrant™ for Access Management for 7th consecutive year](https://www.okta.com/newsroom/press-releases/okta-named-a-leader-in-2023-gartnerr-magic-quadranttm-for-access) - [Okta announces availability of fine-grained authorization for enhanced security and efficiency](https://www.okta.com/newsroom/press-releases/okta-announces-availability-of-fine-grained-authorization-for-enhanced) - [Security Tinkerers hosts “Pitch for Charity” event cosponsored by Okta and SentinelOne at Okta headquarters in San Francisco](https://www.okta.com/newsroom/press-releases/pitch-for-charity) - [Okta is reducing the risk of unmanaged identities, social engineering, and MFA overload for enterprise employees](https://www.okta.com/newsroom/press-releases/okta-is-reducing-the-risk-of-unmanaged-identities-social-engineering) - [Introducing Okta for Global 2000: Identity Solution to Give CEOs and Board of Directors Flexibility to Centralize or Decentralize their Business Strategy](https://www.okta.com/newsroom/press-releases/introducing-okta-for-global-2000-identity-solution-to-give-ceos-and-board) - [Okta named a Leader in 2022 Gartner® Magic Quadrant™ for Access Management for 6th consecutive year](https://www.okta.com/newsroom/press-releases/okta-named-a-leader-in-2022-gartner-magic-quadrant-for-access) - [Okta launches Identity Threat Protection with Okta AI for real-time detection and response](https://www.okta.com/newsroom/press-releases/okta-launches-identity-threat-protection-with-okta-ai-for-real-time) - [Okta puts partners at the heart of its growth strategy](https://www.okta.com/newsroom/press-releases/okta-puts-partners-at-the-heart-of-its-growth-strategy) - [Plaid and Okta partner to deliver secure and seamless access for open finance](https://www.okta.com/newsroom/press-releases/plaid-and-okta-partner-to-deliver-secure-and-seamless-access) - [Okta names Emilie Choi to board of directors](https://www.okta.com/newsroom/press-releases/okta-names-emilie-choi-to-board-of-directors) - [Okta unveils new Okta Workforce Identity Cloud innovations to power enterprise security, productivity, and agility](https://www.okta.com/newsroom/press-releases/okta-unveils-new-okta-workforce-identity-cloud-innovations-to-power) - [Okta names Tony bates to board of directors](https://www.okta.com/newsroom/press-releases/okta-names-tony-bates-to-board-of-directors) - [Accredify secures new strategic investment from Okta Ventures to accelerate digital trust](https://www.okta.com/newsroom/press-releases/accredify-secures-new-strategic-investment-from-okta-ventures-to) - [Okta announces multi-year partnership with the Mclaren Racing Formula 1 team](https://www.okta.com/newsroom/press-releases/okta-announces-multi-year-partnership-with-the-mclaren-racing-formula-1-team) - [A digital disconnect? Irish citizens say yes to online banking and public services, but need more education on the benefits of digital IDs](https://www.okta.com/newsroom/press-releases/a-digital-disconnect-irish-citizens-say-yes-to-online-banking-and-public) - [Okta announces SaaS startup competition to build new Identity Security applications](https://www.okta.com/newsroom/press-releases/okta-announces-saas-startup-competition-to-build-new-identity-security) - [Okta introduces Okta Customer Identity Cloud to help businesses grow user bases without compromising security](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-customer-identity-cloud-to-help-businesses-grow-user) - [Zscaler and Okta enhance enterprise cybersecurity with new Zero Trust integrations](https://www.okta.com/newsroom/press-releases/zscaler-and-okta-enhance-enterprise-cybersecurity-with-new-zero-trust) - [Okta helps builders easily implement auth for GenAI apps a secure how consumers interact with GenAI agents](https://www.okta.com/newsroom/press-releases/okta-helps-builders-easily-implement-auth-for-genai-apps-secure-how) - [Two-thirds of U.S. SMBs name financial loss and trust damage as top cyberattack concerns](https://www.okta.com/newsroom/press-releases/north-american-smb-face-significant-cyberattack-challenges) - [Okta Announces Finalists for SaaS Startup Competition to Build Identity Security Applications](https://www.okta.com/newsroom/press-releases/okta-announces-finalists-for-saas-startup-competition-to-build-identity) - [Okta introduces Okta for US Military, a purpose-built Identity environment for the U.S. Department of Defense](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-for-us-military-a-purpose-built-identity-environment) - [Okta introduces Okta AI – securely connecting people to technology in the AI era](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-ai-securely-connecting-people-to-technology-ai-era) - [Okta announces kickoff of Identity 25 nominations](https://www.okta.com/newsroom/press-releases/okta-announces-kickoff-of-identity-25-nominations) - [Okta recognized in the 2022 Gartner Peer Insights™ ‘Voice of the Customer’: Access Management](https://www.okta.com/newsroom/press-releases/okta-recognized-in-the-2022-gartner-peer-insightstm-voice-of-the-customer) - [Okta launches cybersecurity workforce development initiative to help close the tech and cybersecurity skills gap](https://www.okta.com/newsroom/press-releases/okta-launches-cybersecurity-workforce-development-initiative-to-help) - [Okta announces appointment of Shibu Ninan as new Chief Accounting Officer](https://www.okta.com/newsroom/press-releases/okta-announces-appointment-of-shibu-ninan-as-new-chief-accounting-officer) - [Okta appoints Jon Addison as Chief Revenue Officer and Kerry Ok as Chief Marketing Officer](https://www.okta.com/newsroom/press-releases/okta-appoints-jon-addison-as-chief-revenue-officer-and-kerry-ok-as-chief) - [Okta passes $1 billion in sales in AWS Marketplace](https://www.okta.com/newsroom/press-releases/okta-passes-1-billion-in-sales-in-aws-marketplace) - [Businesses at Work 2021: Driving the digital economy forward](https://www.okta.com/newsroom/articles/businesses-at-work-2021-driving-the-digital-economy-forward) - [Articles](https://www.okta.com/newsroom/articles) - [Businesses at Work 2022: Familiar players in a changing landscape](https://www.okta.com/newsroom/articles/businesses-at-work-2022-familiar-players-in-a-changing-landscape) - [Press Releases](https://www.okta.com/newsroom/press-releases) - [New Okta Platform innovations extend Identity Security Fabric to non-human identities in an agentic AI future](https://www.okta.com/newsroom/press-releases/okta-platform-innovation) - [New Auth0 Platform innovations help developers secure GenAI applications with Identity for AI agents](https://www.okta.com/newsroom/press-releases/auth0-platform-innovation) - [A blueprint for Identity Security in the era of AI and NHIs](https://www.okta.com/newsroom/articles/showcase-announcements) - [AI at Work 2024: A view from the C-suite](https://www.okta.com/newsroom/articles/ai-at-work-2024-a-view-from-the-c-suite) - [Introducing the Okta Secure Identity Commitment](https://www.okta.com/newsroom/press-releases/introducing-the-okta-secure-identity-commitment) - [The weakest link: Securing your extended workforce](https://www.okta.com/newsroom/articles/securing-your-extended-workforce) - [New report: What customers really want in online experiences](https://www.okta.com/newsroom/articles/customer-identity-trends-report) - [What a change of power in Washington means for cybersecurity](https://www.okta.com/newsroom/articles/what-a-change-of-power-in-washington-means-for-cybersecurity) - [People-centered Identity with John Heedley of Vialto Partners](https://www.okta.com/newsroom/articles/people-centered-identity-with-john-heedley-of-vialto-partners) - [Verifying the Identity of your remote workforce](https://www.okta.com/newsroom/articles/verifying-identity-remote-workforce) - [How Okta fosters a security culture](https://www.okta.com/newsroom/articles/how-okta-fosters-a-security-culture) - [Businesses at Work 2025: 10 years of data show how critical security has become](https://www.okta.com/newsroom/articles/businesses-at-work-2025) - [Key findings from our 2023 State of Secure Identity Report](https://www.okta.com/newsroom/articles/key-findings-from-our-2023-state-of-secure-identity-report) - [5 tips to enhance security without sacrificing productivity or user experience](https://www.okta.com/newsroom/articles/5-tips-to-enhance-security-without-sacrificing-productivity-or-user-experience) - [How cybercriminals are using gen AI to scale their scams](https://www.okta.com/newsroom/articles/how-cybercriminals-are-using-gen-ai-to-scale-their-scams) - [New report reveals trends in secure sign-in](https://www.okta.com/newsroom/articles/secure-sign-in-trends-report) - [CISOs’ top threats for 2025, from deepfakes to Scattered Spider](https://www.okta.com/newsroom/articles/cisos-top-threats-for-2025-from-deepfakes-to-scattered-spider) - [Businesses at Work 2023: Innovation and resilience in uncertain times](https://www.okta.com/newsroom/articles/businesses-at-work-2023) - [Businesses at Work 2024: Fundamentals in focus](https://www.okta.com/newsroom/articles/businesses-at-work-2024) - [Win over the board: CISO strategies for proving security’s ROI](https://www.okta.com/newsroom/articles/win-over-the-board-ciso-strategies-for-proving-securitys-roi) - [Five predictions for Identity-centric attacks in 2025](https://www.okta.com/newsroom/articles/five-predictions-for-identity-centric-attacks-in-2025) - [Okta Sees 500 Percent Customer Growth, Including London’s Gatwick Airport](https://www.okta.com/newsroom/press-releases/okta-sees-500-percent-customer-growth-including-londons-gatwick-airport) - [How to measure the success of your security program](https://www.okta.com/newsroom/articles/how-to-measure-the-success-of-your-security-program) - [Okta Threat Intelligence exposes GenAI's role in DPRK IT scams](https://www.okta.com/newsroom/articles/okta-threat-intelligence-exposes-genai-s-role-in-dprk-it-scams) - [The hidden threat in your stack: Why non-human identity management is the next cybersecurity frontier](https://www.okta.com/newsroom/articles/the-hidden-threat-in-your-stack--why-non-human-identity-manageme) - [From vulnerabilities to vendor trust: How CISOs build cyber resilience](https://www.okta.com/newsroom/articles/from-vulnerabilities-to-vendor-trust--how-cisos-build-cyber-resi) - [The next identity imperative: Securing AI agents](https://www.okta.com/newsroom/articles/the-next-identity-imperative--securing-ai-agents) - [Okta's Q1 FY26 earnings recap: In identity security, innovation drives growth](https://www.okta.com/newsroom/articles/oktas-q1-fy26-earnings-recap-in-identity-security-innovation-drives-growth) - [Auth0, Google Cloud partnership raises standards for agent-to-agent authentication](https://www.okta.com/newsroom/articles/auth0--google-cloud-partnership-raises-standards-for-agent-to-ag) - [5 important insights from our 2022 State of Zero Trust report](https://www.okta.com/newsroom/articles/state-of-zero-trust-report-2022-takeaways) - [Securing identity in the age of AI: Insights from Okta Platform’s Chief Product Officer](https://www.okta.com/newsroom/articles/securing-identity-in-the-age-of-ai--insights-from-okta-platform-) - [Okta introduces Cross App Access to help secure AI agents in the enterprise](https://www.okta.com/newsroom/press-releases/okta-introduces-cross-app-access-to-help-secure-ai-agents-in-the) - [The ‘superuser’ blind spot: Why AI agents demand dedicated identity security](https://www.okta.com/newsroom/articles/understanding-the-ai-agent-identity-challenge) - [Customer Identity Trends Report 2025: Securing customer trust in the age of AI](https://www.okta.com/newsroom/articles/customer-identity-trends-report-2025--securing-customer-trust-in) - [The new ‘front door’: A primer on digital identity and how to secure it](https://www.okta.com/newsroom/articles/the-new--front-door---a-primer-on-digital-identity-and-how-to-se) - [Okta observes v0 AI tool used to build phishing sites](https://www.okta.com/newsroom/articles/okta-observes-v0-ai-tool-used-to-build-phishing-sites) - [Navigating AI's impact on security with Guidewire CISO James Dolph](https://www.okta.com/newsroom/articles/navigating-ai-s-impact-on-security-with-guidewire-ciso-james-dol) - [The password problem: Why we need a passwordless world](https://www.okta.com/newsroom/articles/the-password-problem--why-we-need-a-passwordless-world) - [Okta and Palo Alto Networks unify AI-driven security to fight identity attacks](https://www.okta.com/newsroom/press-releases/okta-and-palo-alto-networks-unify-ai-driven-security-to-fight-id) - [Deepfakes and deception: Building a human firewall against AI-powered attacks](https://www.okta.com/newsroom/articles/deepfakes-and-deception--building-a-human-firewall-against-ai-po) - [Sophisticated deception: Thoughtworks CISO Nitin Raina on a new era of social engineering attacks](https://www.okta.com/newsroom/articles/sophisticated-deception--thoughtworks-ciso-nitin-raina-on-a-new-) - [Third-party risk: 3 actions security leaders should take to safeguard their business](https://www.okta.com/newsroom/articles/third-party-risk--3-actions-security-leaders-should-take-to-safe) - [New NIST guidelines share a path to Zero Trust Architecture](https://www.okta.com/newsroom/articles/new-nist-guidelines-share-a-path-to-zero-trust-architecture) - [PGA of America’s CTO/CIO Kevin Scott on AI agents, identity, and the future of golf](https://www.okta.com/newsroom/articles/pga-of-america-s-cto-cio-kevin-scott-on-ai-agents--identity--and) - [Todd’s Take: Securing identity in the age of AI](https://www.okta.com/newsroom/articles/todd-s-take--securing-identity-in-the-age-of-ai) - [Threat actors: “Please do not use Okta FastPass”](https://www.okta.com/newsroom/articles/threat-actors---please-do-not-use-okta-fastpass-) - [AI at Work 2025: Securing the AI-powered workforce](https://www.okta.com/newsroom/articles/ai-at-work-2025--securing-the-ai-powered-workforce) - [Securing agentic AI: Why we need enterprise-grade authorization now](https://www.okta.com/newsroom/articles/securing-agentic-ai--why-we-need-enterprise-grade-authorization-) - [Okta Identity Summit: Securing agentic AI](https://www.okta.com/newsroom/articles/okta-identity-summit--securing-agentic-ai) - [Okta names David Schellhase and Mary Agnes Wilderotter to board of directors](https://www.okta.com/newsroom/press-releases/okta-names-david-schellhase-and-mary-agnes-wilderotter-to-board-) - [The trust deficit: Why consumers are wary of AI agents (and what to do about it)](https://www.okta.com/newsroom/articles/the-trust-deficit--why-consumers-are-wary-of-ai-agents--and-what) - [Okta with Axiom Security: Delivering robust privileged access for modern infrastructure in the AI era](https://www.okta.com/newsroom/press-releases/okta-with-axiom-security--delivering-robust-privileged-access-fo) - [Okta announces second quarter fiscal year 2026 financial results](https://www.okta.com/newsroom/press-releases/okta-announces-second-quarter-fiscal-year-2026-financial-results) - [Okta named to inaugural StateRAMP authorized vendor list](https://www.okta.com/newsroom/press-releases/okta-named-to-inaugural-stateramp-authorized-vendor-list) - [Peraton and Okta partner with US Department of Defense in support of myAuth](https://www.okta.com/newsroom/press-releases/peraton-and-okta-partner-with-department-of-defense-in-support-o) - [Okta CEO highlights strong Q2 performance and AI-driven growth on CNBC](https://www.okta.com/newsroom/articles/okta-ceo-highlights-strong-q2-performance-and-ai-driven-growth-o) - [The Salesloft incident: A wake-up call for SaaS security and IPSIE adoption](https://www.okta.com/newsroom/articles/the-salesloft-incident--a-wake-up-call-for-saas-security-and-ips) - [Why attackers keep winning with consent phishing](https://www.okta.com/newsroom/articles/why-attackers-keep-winning-with-consent-phishing) - [New report: Identity security cuts potential cyber losses by billions](https://www.okta.com/newsroom/articles/new-report--identity-security-cuts-potential-cyber-losses-by-bil) - [Why your AI strategy is exposing you to risk — and what to do about it](https://www.okta.com/newsroom/articles/why-your-ai-strategy-is-exposing-you-to-risk---and-what-to-do-ab) - [Securing good: How strategic tech support is protecting nonprofit missions](https://www.okta.com/newsroom/articles/securing-good--how-strategic-tech-support-is-protecting-nonprofi) - [Preparing for the unknown: The future of data resilience with Druva CTO Stephen Manley](https://www.okta.com/newsroom/articles/preparing-for-the-unknown--the-future-of-data-resilience-with-dr) - [Security researchers uncover VoidProxy, an advanced MFA-bypassing phishing platform](https://www.okta.com/newsroom/articles/security-researchers-uncover-voidproxy--an-advanced-mfa-bypassin) - [How STARs can close the cybersecurity talent gap](https://www.okta.com/newsroom/articles/how-stars-can-close-the-cybersecurity-talent-gap) - [Addressing the growing threat of ransomware with Druva CTO Stephen Manley](https://www.okta.com/newsroom/articles/addressing-the-growing-threat-of-ransomware-with-druva-cto-steph) - [Okta announces finalists for startup challenge to build identity security applications](https://www.okta.com/newsroom/press-releases/okta-announces-finalists-for-startup-challenge-to-build-identity) - [Okta Partner Awards: Celebrating our 2025 Partner Award winners](https://www.okta.com/newsroom/press-releases/okta-partner-awards--celebrating-our-2025-partner-award-winners) - [Old security challenges, new AI risks: Managing authorization in a complex ecosystem](https://www.okta.com/newsroom/articles/old-security-challenges--new-ai-risks--managing-authorization-in) - [New Okta innovations secure the AI-driven enterprise and combat fraud with an identity security fabric](https://www.okta.com/newsroom/press-releases/new-okta-innovations-secure-the-ai-driven-enterprise-and-combat-) - [Box’s CISO on how AI agents can be a ‘force multiplier’ for security](https://www.okta.com/newsroom/articles/box-s-ciso-on-how-ai-agents-can-be-a--force-multiplier--for-secu) - [The s1ngularity attack: When attackers prompt your AI agents to do their bidding](https://www.okta.com/newsroom/articles/the-s1ngularity-attack--when-attackers-prompt-your-ai-agents-to-) - [Okta CSO David Bradbury on the AI race and the price of security shortcuts](https://www.okta.com/newsroom/articles/okta-cso-david-bradbury-on-the-ai-race-and-the-price-of-security) - [AI agents are joining the workforce, but who’s keeping them in check?](https://www.okta.com/newsroom/articles/ai-agents-are-joining-the-workforce--but-who-s-keeping-them-in-c) - [Okta Personal VP Vivek Raman on the power of verifiable digital credentials](https://www.okta.com/newsroom/articles/okta-personal-vp-vivek-raman-on-the-power-of-verifiable-digital-) - [Okta, Google Workspace, and Omnissa partner on best-of-breed security and AI-powered productivity](https://www.okta.com/newsroom/articles/okta--google-workspace--and-omnissa-collaborate-to-deliver-best-) - [Auth0 President Shiv Ramji on building secure apps in the age of AI](https://www.okta.com/newsroom/articles/auth0-president-shiv-ramji-on-building-secure-apps-in-the-age-of) - [North Korea’s IT Workers expand beyond US big tech](https://www.okta.com/newsroom/articles/north-korea-s-it-workers-expand-beyond-us-big-tech) - [Okta welcomes Ric Smith as the new President of Products and Technology](https://www.okta.com/newsroom/press-releases/okta-welcomes-ric-smith-as-the-new-president-of-products-and-tec) - [Auth0 President Shiven Ramji on why identity security is a non-negotiable for AI adoption](https://www.okta.com/newsroom/articles/auth0-president-shiven-ramji-on-why-identity-security-is-a-non-n) - [Welcoming our new Chief Marketing Officer, Shannon Duffy](https://www.okta.com/newsroom/articles/welcoming-our-new-chief-marketing-officer--shannon-duffy)
Version History
Categories
Visit Website
Explore the original website and see their AI training policy in action.
Visit okta.comContent Types
Recent Access
10/26/2025, 6:08:33 PM
10/23/2025, 1:19:38 AM
