# Okta and Auth0 Platforms > The Okta and Auth0 Platforms enable secure access, authentication, and automation — putting Identity at the heart of business security and growth. ## Okta and Auth0 Platforms - [Okta and Auth0 Platforms](https://www.okta.com) — The Okta and Auth0 Platforms enable secure access, authentication, and automation — putting Identity at the heart of business security and growth. ## FAQ - [FAQ](https://www.okta.com/faq) ## Company - [Company](https://www.okta.com/company) — Discover how Okta's Customer and Workforce Identity Cloud solutions can help everyone take control of their digital presence and safely use any technology. ## Identity-101 - [Identity-101](https://www.okta.com/identity-101) — Get up to speed with Identity and Access Management topics with our Identity 101 series. ## Identity 101 Pages - [Defining Intrusion Detection Systems & How IDS Monitors Work](https://www.okta.com/identity-101/intrusion-detection-system) - [Firewall: Definition, How They Work & Why You Need One](https://www.okta.com/identity-101/firewall) - [Understanding Traffic Bots & How to Stop Them](https://www.okta.com/identity-101/traffic-bot) - [What Is a Honeynet? Definition, Usage & the Honeynet Project](https://www.okta.com/identity-101/honeynet) - [Multi-factor Authentication + VPN = Secure and Private](https://www.okta.com/identity-101/mfa-and-vpn) - [Fake Identities: Damages, Data, and Defense](https://www.okta.com/identity-101/fake-identities) - [RSA Encryption: Definition, Architecture, Benefits & Use](https://www.okta.com/identity-101/rsa-encryption) - [Universal 2nd Factor (U2F): History, Evolution, Advantages](https://www.okta.com/identity-101/u2f) - [How Does Facial Recognition Work & Is It Secure?](https://www.okta.com/identity-101/how-does-facial-recognition-work) - [The Importance of Centralized Identity Management](https://www.okta.com/identity-101/the-importance-of-centralized-identity-management) - [Take Your Security to the Next Level with Context-Based Authentication](https://www.okta.com/identity-101/context-based-authentication) - [Should You Choose U2F or Adaptive MFA?](https://www.okta.com/identity-101/u2f-or-adaptive-mfa) - [Fraggle Attack: Definition, Damage, Defense & vs. Smurf](https://www.okta.com/identity-101/fraggle-attack) - [Disaster Recovery: Planning, Strategies, Types & Procedures](https://www.okta.com/identity-101/disaster-recovery) - [Voice Passwords: Definition, Security & How They Work](https://www.okta.com/identity-101/voice-passwords) - [Network Access Control (NAC): Securing Networks by Device](https://www.okta.com/identity-101/network-access-control) - [Password Authentication Protocol (PAP) Security Explained](https://www.okta.com/identity-101/pap-security) - [IP Spoofing Unraveled: What It Is & How to Prevent It](https://www.okta.com/identity-101/ip-spoofing) - [Defining Customer Identity & Access Management (CIAM)](https://www.okta.com/identity-101/ciam) - [What Is a Fork Bomb? Definition, Code, Prevention & Removal](https://www.okta.com/identity-101/fork-bomb) - [What Is Identity Theft? Definition & Examples](https://www.okta.com/identity-101/identity-theft-definition) - [Elliptic Curve Digital Signature Algorithm (ECDSA) Defined](https://www.okta.com/identity-101/ecdsa) - [The PlusToken Cryptocurrency Scheme: Architecture and Exposure](https://www.okta.com/identity-101/plus-token) - [CSRF Attack: Cross-Site Request Forgery Definition & Defense](https://www.okta.com/identity-101/csrf-attack) - [Hashing vs. Encryption: Definitions & Differences](https://www.okta.com/identity-101/hashing-vs-encryption) - [Zero Trust framework: A comprehensive, modern security model](https://www.okta.com/identity-101/zero-trust-framework-a-comprehensive-modern-security-model) - [Tips to Better Leverage Your Active Directory](https://www.okta.com/identity-101/leverage-active-directory) - [What Is Passwordless Authentication & How Does It Work?](https://www.okta.com/identity-101/passwordless) - [Defining Hping Packet Generator as a Security Tool](https://www.okta.com/identity-101/hping) - [Cross Site Tracking: Defining Browser Tracking and Prevention](https://www.okta.com/identity-101/cross-site-tracking) - [Ethical Hacking: What It Is & Examples](https://www.okta.com/identity-101/ethical-hacking) - [What Is a Security Token (or Authentication Token) and How Does It Work?](https://www.okta.com/identity-101/security-token) - [Google Hacking (Google Dorking): Definition & Techniques](https://www.okta.com/identity-101/google-hack) - [What is the Most Secure Authentication Method for Your Organization?](https://www.okta.com/identity-101/what-is-the-most-secure-authentication-method) - [Defining PII (Personally Identifiable Information)](https://www.okta.com/identity-101/pii) - [How to Set Up Privileged Access Management](https://www.okta.com/identity-101/how-to-set-up-privileged-access-management) - [Network Vulnerabilities 101: Types and Prevention Methods](https://www.okta.com/identity-101/network-vulnerability) - [Intrusion Prevention System: What Is An IPS? How Do They Work?](https://www.okta.com/identity-101/intrusion-prevention-system) - [Dual Authentication: A Necessary Extra Layer of Security](https://www.okta.com/identity-101/dual-authentication) - [GDPR Compliant](https://www.okta.com/identity-101/gdpr-compliant) - [Why Is Cloud Security So Important?](https://www.okta.com/identity-101/why-is-cloud-security-so-important) - [Crowdfunding Scams: Common Schemes & How to Avoid Them](https://www.okta.com/identity-101/crowdfunding-scams) - [Zero Trust Implementation: Remodeling Modern Security](https://www.okta.com/identity-101/zero-trust-implementation-remodeling-modern-security) - [Defining & Understanding the MITRE ATT&CK Framework](https://www.okta.com/identity-101/mitre-attack) - [Which Industries Require Two-Factor Authentication?](https://www.okta.com/identity-101/which-industries-require-2fa) - [Defining Certificate Authority and How It Works](https://www.okta.com/identity-101/certificate-authority) - [How CIAM Solutions Help Protect Your Customers’ Data](https://www.okta.com/identity-101/ciam-solutions-protect-customer-data) - [What is PCI? Understanding the Importance of PCI Compliance](https://www.okta.com/identity-101/what-is-pci) - [Phishing prevention 101: Safeguarding your organization](https://www.okta.com/identity-101/phishing-prevention-101-safeguarding-your-organization) - [SSL Handshake (TLS Handshake) Explained](https://www.okta.com/identity-101/ssl-handshake) - [Session Hijacking Attack: Definition, Damage & Defense](https://www.okta.com/identity-101/session-hijacking) - [Authentication Protocols 101: Definition, Types, and When to Use](https://www.okta.com/identity-101/authentication-protocols) - [What Is the Ping of Death (PoD)? Definition, Damage & Defense](https://www.okta.com/identity-101/ping-of-death) - [Public Key Encryption: What Is Public Cryptography?](https://www.okta.com/identity-101/public-key-encryption) - [Privileged access management solutions: Securing critical assets](https://www.okta.com/identity-101/privileged-access-management-solutions) - [What is IDaaS? Understanding Identity as a Service and Its Applications](https://www.okta.com/identity-101/idaas) - [HMAC (Hash-Based Message Authentication Codes) Definition](https://www.okta.com/identity-101/hmac) - [IDS vs. IPS: Definitions, Comparisons & Why You Need Both](https://www.okta.com/identity-101/ids-vs-ips) - [ICMP Protocol (Internet Control Message Protocol): A Guide](https://www.okta.com/identity-101/icmp) - [Privacy, Security, Efficiency: The Benefits of a Cloud Identity Provider](https://www.okta.com/identity-101/cloud-identity) - [Fingerprint Biometrics: Definition & How Secure It Is](https://www.okta.com/identity-101/fingerprint-biometrics-definition-how-secure-it-is) - [Extended Access Control List 101: Access & Privilege](https://www.okta.com/identity-101/extended-access-control-list) - [What Is Role-Based Access Control (RBAC)?](https://www.okta.com/identity-101/what-is-role-based-access-control-rbac) - [Bad Gateway Errors: Why They Happen and 5 Solutions](https://www.okta.com/identity-101/bad-gateway) - [What Is BaaS (Backend as a Service)? Definition and Usage](https://www.okta.com/identity-101/baas-backend-as-a-service) - [Internal IP Address Defined: Purpose & Uses](https://www.okta.com/identity-101/internal-ip) - [Access Control List: Definition, Types & Usages](https://www.okta.com/identity-101/access-control-list) - [Identity Providers (IdPs): What They Are and Why You Need One](https://www.okta.com/identity-101/why-your-company-needs-an-identity-provider) - [CIAM Security](https://www.okta.com/identity-101/ciam-security) - [SOC Reports Explained: Service Organization Control Necessity](https://www.okta.com/identity-101/soc-report) - [Defining Data Profiling: Processes and Usage](https://www.okta.com/identity-101/data-profiling) - [SQL Injection: Definition, Damage & Defense](https://www.okta.com/identity-101/sql-injection-attack) - [Defining Buffer Overflow Attacks & How to Defend Against Them](https://www.okta.com/identity-101/buffer-overflow-attacks) - [Wannacry Ransomware Attack: Definition, Damage & Defense](https://www.okta.com/identity-101/wannacry) - [User Access Management Basics](https://www.okta.com/identity-101/user-access-management) - [Biometric Data: Definition and Security Concerns](https://www.okta.com/identity-101/biometric-data) - [Tokenization Explained: What Is Tokenization & Why Use It?](https://www.okta.com/identity-101/tokenization) - [What Is Identity Management and Access Control?](https://www.okta.com/identity-101/what-is-identity-management-and-access-control) - [What Is Corporate Account Takeover and How Do We Prevent It?](https://www.okta.com/identity-101/what-is-corporate-account-takeover) - [Identification & Authentication: Similarities & Differences](https://www.okta.com/identity-101/identification-vs-authentication) - [Remote Desktop Services (RDS): Security Benefits and Uses](https://www.okta.com/identity-101/remote-desktop-services) - [Address Resolution Protocol (ARP): What It Is and How It Works](https://www.okta.com/identity-101/address-resolution-protocol-arp) - [Phone Security Best Practices to Protect Your Mobile Data](https://www.okta.com/identity-101/phone-security) - [Enterprise SSO: Balancing convenience with uncompromised security](https://www.okta.com/identity-101/enterprise-sso) - [Identity Fabric: The future of Identity and access management](https://www.okta.com/identity-101/identity-fabric-the-future-of-identity-and-access-management) - [Data Integrity: Definition, Importance & Security Impacts](https://www.okta.com/identity-101/data-integrity) - [SASE: Secure Access Service Edge Defined](https://www.okta.com/identity-101/secure-access-service-edge-sase) - [What Is a DNS PTR Record & What Is It Used For?](https://www.okta.com/identity-101/ptr-record) - [Scareware: Definition, Identification & Prevention](https://www.okta.com/identity-101/scareware) - [What is a multicloud management platform?](https://www.okta.com/identity-101/multicloud-management-platform) - [What is secure remote access? Definitions and uses](https://www.okta.com/identity-101/secure-remote-access) - [What is SIEM? Security Information & Event Management 101](https://www.okta.com/identity-101/siem) - [3 Common Mistakes That Lead to a Security Breach](https://www.okta.com/identity-101/mistakes-that-lead-to-security-breach) - [Security compliance: Regulations, best practices, and strategies](https://www.okta.com/identity-101/security-compliance) - [Understanding Zero Trust application access (ZTAA)](https://www.okta.com/identity-101/zero-trust-application-access) - [Coronavirus Malware: Cyber Threats Rising](https://www.okta.com/identity-101/coronavirus-malware) - [WiFi Authentication Errors and Methods to Solve Them](https://www.okta.com/identity-101/authentication-error) - [What Is Token-Based Authentication?](https://www.okta.com/identity-101/what-is-token-based-authentication) - [Strong customer authentication: Securing digital transactions](https://www.okta.com/identity-101/strong-customer-authentication) - [WPA3 Security: Benefits, Vulnerabilities & Comparison to WPA2](https://www.okta.com/identity-101/wpa3-security) - [10 Signs of Identity Theft to Watch Out For](https://www.okta.com/identity-101/signs-of-identity-theft) - [SOC 1 Business Process: Control, Audits, & Compliance](https://www.okta.com/identity-101/soc-1) - [RAT (Remote Access Trojan) Software Attacks Defined](https://www.okta.com/identity-101/remote-access-trojan-rat) - [Cybersecurity mesh: securing every device and access point](https://www.okta.com/identity-101/cybersecurity-mesh) - [LDAP vs. Active Directory: What's the Difference?](https://www.okta.com/identity-101/ldap-vs-active-directory) - [Automated provisioning: Secure, efficient user access management](https://www.okta.com/identity-101/automated-provisioning) - [Video Verification: Definition, Technology, Risks & Benefits](https://www.okta.com/identity-101/video-verification-definition-technology-risks-benefits) - [Understanding Adaptive Authentication and How It Works](https://www.okta.com/identity-101/adaptive-authentication) - [Alphanumeric Characters and Alphanumeric Password Requirements](https://www.okta.com/identity-101/alphanumeric-characters-password) - [PEAP (Protected Extensible Authentication Protocol)](https://www.okta.com/identity-101/peap) - [What is Enhanced Due Diligence? Definition & Procedures](https://www.okta.com/identity-101/enhanced-due-diligence) - [Ping Trace Techniques for Network Connectivity Troubleshooting](https://www.okta.com/identity-101/ping-trace) - [What is MD5? Understanding Message-Digest Algorithms](https://www.okta.com/identity-101/md5) - [How Legacy Apps Are Moving to the Cloud: Office 365](https://www.okta.com/identity-101/cloud-microsoft-office-365) - [Replay Attack: Process, Impacts, and Defense](https://www.okta.com/identity-101/replay-attack) - [Authentication Server: Definition, Architecture & Operations](https://www.okta.com/identity-101/authentication-server) - [Social Engineering: How It Works, Examples & Prevention](https://www.okta.com/identity-101/social-engineering) - [Web Authentication: How Is Web API Basic Authentication Used?](https://www.okta.com/identity-101/web-authentication) - [Penetration Testing: What Is It & Why Is Pentesting Required?](https://www.okta.com/identity-101/penetration-testing) - [Identity resolution: The key to accurate, unified user profiles](https://www.okta.com/identity-101/identity-resolution) - [Defining Cloud Computing: Systems, Architecture, and Uses](https://www.okta.com/identity-101/cloud-computing) - [Understanding the California Consumer Privacy Act (CCPA)](https://www.okta.com/identity-101/ccpa) - [Entitlement Management Identity Governance Explained](https://www.okta.com/identity-101/entitlement-management-identity-governance-explained) - [Multi-Tenancy Cloud: Definition, Security & Benefits](https://www.okta.com/identity-101/multi-tenancy-cloud) - [SOC 1 vs. SOC 2: Differences, Execution, and Legalities](https://www.okta.com/identity-101/soc-1-vs-soc-2) - [What’s the Difference Between OAuth, OpenID Connect, and SAML?](https://www.okta.com/identity-101/whats-the-difference-between-oauth-openid-connect-and-saml) - [SSL Offloading 101: Definition, Processes & Objectives](https://www.okta.com/identity-101/ssl-offloading) - [Low Orbit Ion Cannon (LOIC): Definition, Damage & Defense](https://www.okta.com/identity-101/low-orbit-ion-cannon-loic) - [Security as a Service (SECaaS): Advantages & Services](https://www.okta.com/identity-101/security-as-a-service-secaas) - [What Is Access Control & How Crucial Is It to Cybersecurity?](https://www.okta.com/identity-101/access-control) - [SAML vs. OAuth: Comparison and Differences](https://www.okta.com/identity-101/saml-vs-oauth) - [Biometrics: Secure Authentication in the Modern Age](https://www.okta.com/identity-101/biometrics-secure-authentication) - [Password vs. Passphrase: Differences & Which Is Better?](https://www.okta.com/identity-101/password-vs-passphrase) - [End-to-End Encryption (E2EE): Definition & Examples](https://www.okta.com/identity-101/end-to-end-encryption) - [Cloud Identity and Access Management: Security transformed](https://www.okta.com/identity-101/cloud-identity-and-access-management) - [What is Authentication? Methods, Importance, & Processes](https://www.okta.com/identity-101/authentication) - [CIAM Architecture: Powering secure, seamless customer experiences](https://www.okta.com/identity-101/ciam-architecture) - [Bot Management Definition, Strategies & Best Practices](https://www.okta.com/identity-101/bot-management) - [What Is Cryptography? Definition & How It Works](https://www.okta.com/identity-101/cryptography) - [Fault Tolerance: Definition, Testing & Importance](https://www.okta.com/identity-101/fault-tolerance) - [Strong Authentication: Definition & Security Factors](https://www.okta.com/identity-101/what-is-strong-authentication) - [Private Cloud: Definition, Architecture, Benefits, and Limits](https://www.okta.com/identity-101/private-cloud) - [What are Behavioral Biometrics? Types & Technology](https://www.okta.com/identity-101/behavioral-biometrics) - [GRC Tools and Platforms for 2022](https://www.okta.com/identity-101/grc-tools) - [Risk-Based Authentication: What You Need to Consider](https://www.okta.com/identity-101/risk-based-authentication) - [Password Encryption: How Do Password Encryption Methods Work?](https://www.okta.com/identity-101/password-encryption) - [One-Way Hash Function: Dynamic Algorithms](https://www.okta.com/identity-101/one-way-hash-function) - [One-Way Hash Function: Dynamic Algorithms](https://www.okta.com/identity-101/one-way-hash-function-dynamic-algorithms) - [Identity and access management best practices for enhanced security](https://www.okta.com/identity-101/identity-and-access-management-best-practices-for-enhanced-security) - [How Okta Helps Automate User Provisioning for Active Directory](https://www.okta.com/identity-101/automate-user-provisioning-for-active-directory) - [4 Key Things You Should Know About Access Governance](https://www.okta.com/identity-101/4-things-you-should-know-about-access-governance) - [IT modernization: Balancing security and user experience](https://www.okta.com/identity-101/it-modernization) - [Credential Stuffing: Definition, Techniques & Defense ](https://www.okta.com/identity-101/credential-stuffing) - [Identity and Access Management Solutions: Balancing Security and UX](https://www.okta.com/identity-101/identity-and-access-management-solutions) - [What is Identity Security?](https://www.okta.com/identity-101/what-is-identity-security) - [What Is a Systems Administrator & What Do They Do?](https://www.okta.com/identity-101/system-administrator) - [Clickjacking: Definition, Defense & Prevention](https://www.okta.com/identity-101/clickjacking) - [What is a Network Access Server?](https://www.okta.com/identity-101/what-is-a-network-access-server) - [Central Authentication Service (CAS) Protocol Explained](https://www.okta.com/identity-101/central-authentication-service) - [Anonymous IP Browsing: Types, Risks, and Detection](https://www.okta.com/identity-101/anonymous-ip) - [CAPTCHA: Meaning, Types & How They Work](https://www.okta.com/identity-101/captcha) - [Single Sign-On: The Difference Between ADFS vs. LDAP](https://www.okta.com/identity-101/single-sign-on-adfs-vs-ldap) - [Macro Virus: Definition, Operation, Prevention & Removal](https://www.okta.com/identity-101/macro-virus) - [Tactics to Avoid Password Leaks](https://www.okta.com/identity-101/password-leak) - [Authentication vs. Authorization](https://www.okta.com/identity-101/authentication-vs-authorization) - [Brute force attacks: Understanding, types, and prevention](https://www.okta.com/identity-101/brute-force) - [RBAC vs. ABAC: Definitions & When to Use](https://www.okta.com/identity-101/role-based-access-control-vs-attribute-based-access-control) - [SOC 2 Type 2 for Service Organizations: Fairness and Trust](https://www.okta.com/identity-101/soc-2-type-2) - [6 Password Hacker Tools and Protecting Against Them](https://www.okta.com/identity-101/password-hacker) - [Defining DLP (Data Loss Prevention) & Exploring How it Works](https://www.okta.com/identity-101/data-loss-prevention) - [What Is Least Privilege Access—and Why Do You Need It?](https://www.okta.com/identity-101/what-is-least-privilege-access) - [Wired Equivalent Privacy (WEP): Definition & Risks](https://www.okta.com/identity-101/wep) - [HTTP Error 431: Definition, Status, Causes & Solutions](https://www.okta.com/identity-101/http-error-431) - [SMS Gateway: Definition, Uses, and How They Work](https://www.okta.com/identity-101/sms-gateway) - [Cyber Hygiene: Definition & Best Practices](https://www.okta.com/identity-101/cyber-hygiene) - [WiFi Pineapple Definition & Pineapple Router Uses](https://www.okta.com/identity-101/wifi-pineapple) - [PAN (Personal Area Network) Definition & Overview](https://www.okta.com/identity-101/personal-area-network-pan) - [What Is a Virtual Machine? Definition & Guide](https://www.okta.com/identity-101/virtual-machines) - [Reverse Proxy: What Is a Reverse Proxy and Why Use One?](https://www.okta.com/identity-101/reverse-proxy) - [DDoS Attack: A guide to distributed denial-of-service attacks](https://www.okta.com/identity-101/ddos-attack) - [Biometric Passport: Security, Data Protection & How They Work](https://www.okta.com/identity-101/biometric-passport) - [Secrets Management: Tools & Methods for Authentication](https://www.okta.com/identity-101/secrets-management) - [XSS Vulnerability 101: Identify and Stop Cross-Site Scripting](https://www.okta.com/identity-101/xss-vulnerability) - [What Is Hybrid Cloud Architecture and How Can We Use It?](https://www.okta.com/identity-101/what-is-hybrid-cloud-architecture) - [What Is the Cloud? Defining Remote Internet Infrastructures](https://www.okta.com/identity-101/what-is-the-cloud) - [Understanding Proxy Servers and How They Work](https://www.okta.com/identity-101/proxy-server) - [Insider Threat: Definition, Prevention & Defense](https://www.okta.com/identity-101/insider-threat) - [Rooted Devices: Definition, Benefits & Security Risks](https://www.okta.com/identity-101/rooted-device) - [Access Token: Definition, Architecture, Usage & More](https://www.okta.com/identity-101/access-token) - [Augmented Intelligence (AI): The Future of Cognitive Security](https://www.okta.com/identity-101/augmented-intelligence) - [Identity and Access Management (IAM) Overview](https://www.okta.com/identity-101/identity-and-access-management) - [What Is Federated Identity?](https://www.okta.com/identity-101/what-is-federated-identity) - [Honeypots: Definition & Role in Cybersecurity Testing](https://www.okta.com/identity-101/honeypots) - [Virtual Hosting: Types, Architecture, Uses & Benefits](https://www.okta.com/identity-101/virtual-host) - [What Is Authorization? Comparison with Access Control](https://www.okta.com/identity-101/authorization) - [Generic Routing Encapsulation (GRE) Tunnel Defined](https://www.okta.com/identity-101/gre-tunnel) - [Customer Identification Program (CIP): Definition & Guidelines](https://www.okta.com/identity-101/cip-banking) - [LEI (Legal Entity Identifier): Creation, Usage & Benefits](https://www.okta.com/identity-101/lei) - [HLS Streaming: Definition, Usage, Pros & Cons](https://www.okta.com/identity-101/hls-streaming) - [What Is Application Security & Why Is It Essential?](https://www.okta.com/identity-101/application-security) - [Steganography: What Is It & How Does It Work?](https://www.okta.com/identity-101/steganography) - [Server Name Indication (SNI): Definition & Usage](https://www.okta.com/identity-101/sni) - [OSI Layers: Understanding the OSI Model & Its 7 Layers](https://www.okta.com/identity-101/osi-layers) - [Emotet Malware: Definition, Damage, Defense & Prevention](https://www.okta.com/identity-101/emotet) - [Evil Twin Attack: Fake WiFi Access Point Vulnerabilities](https://www.okta.com/identity-101/evil-twin-attack) - [What Is Cached Data? Why & How Should You Clear It?](https://www.okta.com/identity-101/cached-data) - [Understanding Lifecycle Management and Regulatory Compliance](https://www.okta.com/identity-101/lifecycle-management-and-regulatory-compliance) - [Black-Box Testing: Definition, Types & Techniques](https://www.okta.com/identity-101/black-box-testing) - [Slowloris DDoS Attack: Definition, Damage & Defense](https://www.okta.com/identity-101/slowloris) - [How to Start Investing in Identity and Access Management](https://www.okta.com/identity-101/invest-in-identity-and-access-management) - [What Is Public Key Infrastructure (PKI) & How Does It Work?](https://www.okta.com/identity-101/public-key-infrastructure) - [Medical Identity Theft: Defense & Prevention Measures](https://www.okta.com/identity-101/prescription-identity) - [Correlation ID: Definition, Functionality and Uses](https://www.okta.com/identity-101/correlation-id) - [MX Record: Definition, Usage & Protections](https://www.okta.com/identity-101/mx-record) - [How Identity and Access Management Quietly Powers Your Company](https://www.okta.com/identity-101/iam-powers-your-company) - [Understanding the Process of Identity Authentication](https://www.okta.com/identity-101/identity-authentication) - [CISSP: Certified Information Systems Security Professional](https://www.okta.com/identity-101/cissp) - [Server-Side Request Forgery (SSRF): Definition & Defense](https://www.okta.com/identity-101/ssrf) - [What Is Round Trip Time? Overview, Formula & Usage](https://www.okta.com/identity-101/round-trip-time-rtt) - [What Is a DNS SOA Record & What Is It Used For?](https://www.okta.com/identity-101/soa-record) - [Digital Onboarding: Definition, Benefits & How It Works](https://www.okta.com/identity-101/digital-onboarding-definition-benefits-how-it-works) - [IP Stresser (IP Booter) Definition & Uses](https://www.okta.com/identity-101/stresser) - [Serverless Computing: Uses, Advantages, and Disadvantages](https://www.okta.com/identity-101/serverless-computing) - [Principle of Least Privilege: Definition, Methods & Examples](https://www.okta.com/identity-101/minimum-access-policy) - [Advanced Persistent Threat: Definition, Lifecycle & Defense](https://www.okta.com/identity-101/advanced-persistent-threat-apt) - [Time to Live (TTL): Meaning, Purpose & Usage](https://www.okta.com/identity-101/ttl) - [Fraud Prevention: Definition & How It Works](https://www.okta.com/identity-101/fraud-detection) - [What Does a CISO (Chief Information Security Officer) Do?](https://www.okta.com/identity-101/ciso) - [What Is MyDoom Malware? History, How It Works & Defense](https://www.okta.com/identity-101/mydoom) - [Malvertising: Definition, Techniques & Defense](https://www.okta.com/identity-101/malvertising) - [RC4 Encryption Algorithm Stream Ciphers Defined](https://www.okta.com/identity-101/rc4-stream-cipher) - [Data in Motion: How to Protect Information in Transit](https://www.okta.com/identity-101/data-in-motion) - [Federated Identity Management vs. Single Sign-On: What’s the Difference?](https://www.okta.com/identity-101/federated-identity-vs-sso) - [Build a Strategy for Password Management](https://www.okta.com/identity-101/strategy-for-password-management) - [What Is Cybersecurity? Definition, Threats & More](https://www.okta.com/identity-101/cybersecurity) - [Data Transfer Object DTO Definition and Usage](https://www.okta.com/identity-101/dto) - [Understanding Private IP Ranges, Uses, Benefits, and Warnings](https://www.okta.com/identity-101/understanding-private-ip-ranges) - [DNS Over HTTPS: Remote DNS Resolutions by HTTPS Protocol](https://www.okta.com/identity-101/dns-over-https) - [What Is the Morris Worm? History and Modern Impact](https://www.okta.com/identity-101/morris-worm) - [Fake Employment Verification: Techniques & Defenses](https://www.okta.com/identity-101/fake-employment-verification) - [DMZ Network: What Is a DMZ & How Does It Work?](https://www.okta.com/identity-101/dmz) - [Building Zero Trust Networks: Securing the Perimeter](https://www.okta.com/identity-101/building-zero-trust-networks) - [Account Takeover Fraud: Definition and Defenses](https://www.okta.com/identity-101/account-takeover-fraud) - [SD-Wan: Defining a Software-Defined Wide Area Network](https://www.okta.com/identity-101/sd-wan) - [DNS Poisoning (DNS Spoofing): Definition, Technique & Defense](https://www.okta.com/identity-101/dns-poisoning) - [What Is a Botnet? Definition, How They Work & Defense](https://www.okta.com/identity-101/botnet) - [Synthetic Identity Theft: Definition, Damages & Defense](https://www.okta.com/identity-101/synthetic-identity-theft) - [What Is a VPN & How Does It Work?](https://www.okta.com/identity-101/what-is-a-vpn) - [Zoom Vulnerability: Definition & Defense Techniques](https://www.okta.com/identity-101/zoom-vulnerability) - [Origin Servers: Definition, Usage & Edge Server Comparison](https://www.okta.com/identity-101/origin-servers) - [Cloud Computing Security: Your Comprehensive Guide](https://www.okta.com/identity-101/cloud-computing-security) - [What's an Attack Vector? Definition, Common Exploits, & Protection](https://www.okta.com/identity-101/attack-vector) - [Information Classification: Definition & Internal Development](https://www.okta.com/identity-101/information-classification) - [DLL Hijacking Definition Tutorial & Prevention](https://www.okta.com/identity-101/dll-hijacking) - [MAN: Definition & How It Compares to a LAN](https://www.okta.com/identity-101/man-network) - [Social Engineering Attacks: Definition, Methods & Prevention](https://www.okta.com/identity-101/social-engineering-attacks) - [HTTP vs. HTTPS: Definition, Comparison & Security Implications](https://www.okta.com/identity-101/http-vs-https) - [Customer Due Diligence (CDD) Process Defined](https://www.okta.com/identity-101/what-is-customer-due-diligence) - [Bring Your Own Device (BYOD) Policy Best Practices](https://www.okta.com/identity-101/byod-policy) - [API Management: Publishing, Policies, and Access Control](https://www.okta.com/identity-101/api-management) - [What Is a Cryptographic Nonce? Definition & Meaning](https://www.okta.com/identity-101/nonce) - [What is an Attack Surface? (And How to Reduce It)](https://www.okta.com/identity-101/what-is-an-attack-surface) - [How Identity Governance Protects Your Business](https://www.okta.com/identity-101/how-identity-governance-protects-your-business) - [Hashing Algorithm Overview: Types, Methodologies & Usage](https://www.okta.com/identity-101/hashing-algorithms) - [Man-in-the-Browser Attack (MITB): Definition & Defense](https://www.okta.com/identity-101/man-in-the-browser) - [What Is a Teardrop Attack? Definition, Damage & Defense](https://www.okta.com/identity-101/teardrop-attack) - [Security Through Obscurity (STO): History, Criticism & Risks](https://www.okta.com/identity-101/security-through-obscurity) - [What Is Deep Packet Inspection (DPI)? Definition & Usage](https://www.okta.com/identity-101/deep-packet-inspection) - [Ransomware Defined: How Does It Work & How to Prevent It](https://www.okta.com/identity-101/ransomware) - [What Is a Digital Certificate? Definition & Examples](https://www.okta.com/identity-101/digital-certificate) - [Setting Up IAM: Managing Permissions to Ensure Compliance](https://www.okta.com/identity-101/iam-compliance) - [Digital Signatures: What They Are & How They Work](https://www.okta.com/identity-101/digital-signature) - [Defining SYN Flood DDoS Attacks: Definition, Damage & Defense](https://www.okta.com/identity-101/syn-flood) - [WFH Cybersecurity Guide for Employers and Employees](https://www.okta.com/identity-101/work-from-home-security) - [Sniffing Attack: Definition, Defense & Prevention](https://www.okta.com/identity-101/sniffing-attack) - [What are Web Application Firewalls? Definition & Usage](https://www.okta.com/identity-101/waf) - [How to Choose Your SSO Strategy](https://www.okta.com/identity-101/sso-strategy) - [What is Threat Intelligence? Mechanisms & Implications](https://www.okta.com/identity-101/threat-intelligence) - [SPF Record Checks: How to Check SPF Records and Why You Should](https://www.okta.com/identity-101/spf-record-check) - [Warrant Canary: Definition, Evolution & Impacts](https://www.okta.com/identity-101/warrant-canary) - [Security Hacker: History, Types, Exploits, and Benefits](https://www.okta.com/identity-101/security-hacker) - [Scale Securely: Establishing Universal Directory Policies](https://www.okta.com/identity-101/establishing-directory-policies) - [Identity Verification Defined and How Does It Work](https://www.okta.com/identity-101/identity-verification) - [Managing the User Lifecycle: Device Provisioning Made Easy](https://www.okta.com/identity-101/user-lifecycle-device-provisioning) - [Self-Sovereign Identity (SSI): Autonomous Identity Management](https://www.okta.com/identity-101/self-sovereign-identity) - [Fraud Monitoring: Definition, Importance & Defenses](https://www.okta.com/identity-101/fraud-monitoring) - [ARP Poisoning: Definition, Techniques, Defense & Prevention](https://www.okta.com/identity-101/arp-poisoning) - [What Is a Keylogger and How Can You Protect Yourself From One?](https://www.okta.com/identity-101/keylogger) - [What Is Latency? Definition, Impact & How to Reduce](https://www.okta.com/identity-101/latency) - [Data Exfiltration: Definition, Damage & Defense](https://www.okta.com/identity-101/data-exfiltration) - [What Is GPS Spoofing and How Do You Defend Against It?](https://www.okta.com/identity-101/gps-spoofing) - [What Is LDAP & How Does It Work?](https://www.okta.com/identity-101/what-is-ldap) - [What Is Edge Computing & Why Does it Matter?](https://www.okta.com/identity-101/edge-computing) - [Password Entropy: The Value of Unpredictable Passwords](https://www.okta.com/identity-101/password-entropy) - [What Is Transport Layer Security & How Does It Work?](https://www.okta.com/identity-101/tls-protocol) - [Understanding the Metasploit Project and Why It's Useful](https://www.okta.com/identity-101/metasploit) - [Stream Cipher 101: Definition, Usage & Comparisons](https://www.okta.com/identity-101/stream-cipher) - [The Changing Landscape of Enterprise Identity Management](https://www.okta.com/identity-101/the-changing-landscape-of-enterprise-identity-management) - [Identity Theft Protection: How It Works & Do You Need It?](https://www.okta.com/identity-101/identity-theft-protection) - [What Is MTU (Maximum Transmission Unit)?](https://www.okta.com/identity-101/mtu) - [Cybersecurity Work From Home Tips for Businesses and Employees](https://www.okta.com/identity-101/cyber-security-work-from-home) - [What Is SaaS? Defining Software as a Service](https://www.okta.com/identity-101/saas) - [Age Verification System: Definition, Processes, and Usage](https://www.okta.com/identity-101/age-verification-system) - [Script Kiddies and Skiddies: Identifying Unskilled Hackers](https://www.okta.com/identity-101/script-kiddie) - [Digital Rights Management (DRM): Access Control Tech Defined](https://www.okta.com/identity-101/digital-rights-management-drm-access-control-tech-defined) - [What Is Data Scraping? Definition & Usage](https://www.okta.com/identity-101/data-scraping) - [How To Plan a Successful Cloud Migration Strategy](https://www.okta.com/identity-101/plan-a-successful-migration-strategy) - [What is a zero-day exploit?](https://www.okta.com/identity-101/what-is-zero-day-exploit) - [Privacy vs. Security: Exploring the Differences & Relationship](https://www.okta.com/identity-101/privacy-vs-security) - [What Is a Spam Bot? Definition & Defenses](https://www.okta.com/identity-101/spam-bot) - [Arbitrary Code Execution (ACE): Definition & Defense](https://www.okta.com/identity-101/arbitrary-code-execution) - [What Is an SDK? Software Development Kits Explained](https://www.okta.com/identity-101/what-is-an-sdk) - [Cyber Kill Chain: Definition and Steps](https://www.okta.com/identity-101/cyber-kill-chain) - [What Is a Smurf Attack? Definition & Defense](https://www.okta.com/identity-101/smurf-attack) - [What Is Middleware? Definition, Guide & Examples](https://www.okta.com/identity-101/middleware) - [What is UEBA (user and entity behavior analytics)?](https://www.okta.com/identity-101/ueba) - [Malicious Code: Types, Dangers, and Defenses](https://www.okta.com/identity-101/malicious-code) - [The KYC Verification Process: 3 Steps to Compliance](https://www.okta.com/identity-101/kyc-verification) - [RFID Blocking: Definition, How It Works & Why You Need It](https://www.okta.com/identity-101/rfid-blocking) - [What to Look for When Choosing a Single Sign-On Solution](https://www.okta.com/identity-101/single-sign-on-solution) - [Understanding Digital Identity & How It Works](https://www.okta.com/identity-101/digital-identity) - [Cloud-Native Architecture: A Guide, Definitions, Types & More](https://www.okta.com/identity-101/what-is-cloud-native-architecture) - [KYC (Know Your Customer) Definition, Guidelines & Regulations](https://www.okta.com/identity-101/kyc) - [The Rising Importance of Identity Proofing](https://www.okta.com/identity-101/identity-proofing) - [Why Multi-Factor Authentication (MFA) Is Important](https://www.okta.com/identity-101/why-mfa-is-everywhere) - [What Is 1.1.1.1 & Does It Really Make Your Internet Safer?](https://www.okta.com/identity-101/1-1-1-1) - [Fine-grained access control (FGAC): Precision data security](https://www.okta.com/identity-101/fine-grained-access-control) - [Asymmetric Encryption: Definition, Architecture, Usage](https://www.okta.com/identity-101/asymmetric-encryption) - [How Secure Is a VPN & Should You Still Use One?](https://www.okta.com/identity-101/how-secure-is-a-vpn) - [Mirai Botnet Malware: Definition, Impacts & Evolution](https://www.okta.com/identity-101/mirai-botnet) - [PGP: Defining Pretty Good Privacy & How PGP Encryption Works](https://www.okta.com/identity-101/pgp-pretty-good-privacy) - [What is Agentic AI](https://www.okta.com/identity-101/what-is-agentic-ai) - [What is API Security](https://www.okta.com/identity-101/what-is-api-security) - [Threat Hunting](https://www.okta.com/identity-101/threat-hunting) - [Agentic AI Governance and Compliance](https://www.okta.com/identity-101/agentic-ai-governance-and-compliance) - [Agentic AI Security Threats](https://www.okta.com/identity-101/agentic-ai-security-threats) - [What are Non Human Identities](https://www.okta.com/identity-101/what-are-non-human-identities) - [What is non-human identity security](https://www.okta.com/identity-101/what-is-non-human-identity-security) - [AI Agent Lifecycle Management](https://www.okta.com/identity-101/ai-agent-lifecycle-management) ## Products - [Products](https://www.okta.com/products) - [Single Sign-On (CIC)](https://www.okta.com/products/single-sign-on-customer-identity) - [User Management (CIC)](https://www.okta.com/products/user-management-customer-identity) - [Organizations](https://www.okta.com/products/organizations) - [FastPass](https://www.okta.com/products/fastpass) - [Workflows](https://www.okta.com/products/workflows) - [Access Gateway](https://www.okta.com/products/access-gateway) - [Adaptive MFA](https://www.okta.com/products/adaptive-multi-factor-authentication) - [Breached Password Detection](https://www.okta.com/products/breached-passwords) - [Login Security](https://www.okta.com/products/login-security) - [User Management](https://www.okta.com/products/user-management) - [User Authentication](https://www.okta.com/products/authentication) - [Advanced Server Access](https://www.okta.com/products/advanced-server-access) - [Universal Login](https://www.okta.com/products/universal-login) - [Actions (CIC)](https://www.okta.com/products/actions) - [Access Management](https://www.okta.com/products/access-management) - [Authentication (CIC)](https://www.okta.com/products/authentication-customer-identity) - [Cloud Deployment](https://www.okta.com/products/cloud-deployment) - [Extensibility](https://www.okta.com/products/extensibility) - [Passwordless Authentication](https://www.okta.com/products/passwordless) - [Machine to Machine](https://www.okta.com/products/machine-to-machine) - [Multi-Factor Authentication](https://www.okta.com/products/multi-factor-authentication) - [Highly Regulated Identity](https://www.okta.com/products/regulated-identity) - [API Access Management](https://www.okta.com/products/api-access-management) - [B2B Integration](https://www.okta.com/products/b2b-integration) - [Device Access](https://www.okta.com/products/device-access) - [Identity Governance](https://www.okta.com/products/identity-governance) - [Identity Threat Protection](https://www.okta.com/products/identity-threat-protection) - [Lifecycle Management](https://www.okta.com/products/lifecycle-management) - [Okta AI](https://www.okta.com/products/okta-ai) - [Privileged Access](https://www.okta.com/products/privileged-access) - [Release Overview](https://www.okta.com/products/release-overview) - [Secure Partner Access](https://www.okta.com/products/secure-partner-access) - [Single Sign-On](https://www.okta.com/products/single-sign-on-workforce-identity) - [Universal Directory](https://www.okta.com/products/universal-directory) - [Forms (CIC)](https://www.okta.com/products/forms) - [Forms (CIC)](https://www.okta.com/products/forms-for-actions) - [Mergers and Acquisitions](https://www.okta.com/products/mergers-and-acquisitions) - [[REDIRECTED] Global 2000](https://www.okta.com/products/global-2000) - [Okta Customer Identity](https://www.okta.com/products/okta-customer-identity) - [Auth0 Platform](https://www.okta.com/products/customer-identity) - [Okta Workforce Identity](https://www.okta.com/products/workforce-identity) - [Identity Security Posture Management](https://www.okta.com/products/identity-security-posture-management) - [Release Overview](https://www.okta.com/products/release-overview-workforce-identity) - [Okta Personal](https://www.okta.com/products/okta-personal) ## Blog - [Blog](https://www.okta.com/blog) — At the Okta Blog, you can view stories, insights, and advice that transform the way organizations secure identity in a way that only Okta can. ## Blog Category Pages - [Author](https://www.okta.com/blog/author) - [Topic](https://www.okta.com/blog/topic) - [Identity Security | Blog](https://www.okta.com/blog/identity-security) - [Product Innovation | Blog](https://www.okta.com/blog/product-innovation) - [Industry Insights | Blog](https://www.okta.com/blog/industry-insights) - [Company & Culture | Blog](https://www.okta.com/blog/company-and-culture) - [Customers & Partners | Blog](https://www.okta.com/blog/customers-and-partners) - [AI | Blog](https://www.okta.com/blog/ai) ## Blog Posts - [Tools for detecting and responding to potential threats post authentication](https://www.okta.com/blog/identity-security/tools-for-detecting-and-responding-to-potential-threats-post-authentication) - [What Is Spear Phishing?](https://www.okta.com/blog/identity-security/what-is-spear-phishing) - [Uncovering the power of passkeys and their resilience against phishing](https://www.okta.com/blog/identity-security/uncovering-the-power-of-passkeys-and-their-resilience-against-phishing) - [What Is single sign-on (SSO)?](https://www.okta.com/blog/identity-security/single-sign-on-sso) - [Secure your application through the SURF Security browser and Okta](https://www.okta.com/blog/identity-security/secure-your-application-through-the-surf-security-browser-and-okta) - [Outsmart impersonators with Identity verification built into the Okta Platform](https://www.okta.com/blog/identity-security/outsmart-impersonators-with-identity-verification-built-into-the-okta-platform) - [The Path to Continuous Authentication: Solving the Best of Breed Problem](https://www.okta.com/blog/identity-security/the-path-to-continuous-authentication-solving-the-best-of-breed-problem) - [What Is CIAM and why does it matter?](https://www.okta.com/blog/identity-security/what-is-ciam-why-does-it-matter) - [We’ve gone 100% passwordless for workforce apps](https://www.okta.com/blog/identity-security/weve-gone-100-passwordless-for-workforce-apps) - [What is ADFS?](https://www.okta.com/blog/identity-security/what-is-adfs) - [What is a One-Time Password (OTP)?](https://www.okta.com/blog/identity-security/what-is-a-one-time-password-otp) - [Top 5 ways Identity Governance Strengthens your Security](https://www.okta.com/blog/identity-security/top-5-ways-identity-governance-strengthens-your-security) - [What Is SAML and How Does It Work?](https://www.okta.com/blog/identity-security/what-is-saml) - [Why we’re going 100% passwordless at Okta](https://www.okta.com/blog/identity-security/why-were-going-passwordless-at-okta) - [Tools for strengthening your Identity posture before authentication](https://www.okta.com/blog/identity-security/tools-for-strengthening-your-identity-posture-before-authentication) - [What Is an Identity platform?](https://www.okta.com/blog/identity-security/what-is-an-identity-platform) - [Why You Should Ditch SMS as an Auth Factor](https://www.okta.com/blog/identity-security/why-you-should-ditch-sms-as-an-auth-factor) - [What Is Two-Factor Authentication (2FA)? ](https://www.okta.com/blog/identity-security/what-is-two-factor-authentication-2fa) - [Meet the Experts: Solving for Compliance Needs with IAM](https://www.okta.com/blog/identity-security/solving-for-compliance-needs-with-iam) - [Decentralized Identity: The future of digital Identity management](https://www.okta.com/blog/identity-security/what-is-decentralized-identity) - [What Is Identity and Access Management (IAM)?](https://www.okta.com/blog/identity-security/what-is-identity-and-access-management-iam) - [Tools for enforcing authentication policy](https://www.okta.com/blog/identity-security/tools-for-enforcing-authentication-policy) - [What is SCIM?](https://www.okta.com/blog/identity-security/what-is-scim) - [The Ultimate Authentication Playbook](https://www.okta.com/blog/identity-security/the-ultimate-authentication-playbook) - [What Is SMS Authentication and Is It Secure?](https://www.okta.com/blog/identity-security/sms-authentication) - [What is Federation and Why Should Your Apps Support it?](https://www.okta.com/blog/identity-security/what-is-federation-and-why-should-your-apps-support-it) - [Securing the future of work: Why Zero Trust is critical in a hybrid world](https://www.okta.com/blog/identity-security/securing-the-future-of-work-why-zero-trust-is-critical-in-a-hybrid-world) - [The Need for Phishing-Resistant Multi-Factor Authentication](https://www.okta.com/blog/identity-security/the-need-for-phishing-resistant-multi-factor-authentication) - [New secure Identity integrations streamline advanced protection for your most critical applications](https://www.okta.com/blog/identity-security/new-secure-identity-integrations-streamline-advanced-protection-for-your-most-critical) - [What is WebAuthn?](https://www.okta.com/blog/identity-security/what-is-webauthn) - [The most targeted companies choose phishing-resistant MFA](https://www.okta.com/blog/identity-security/the-most-targeted-companies-choose-phishing-resistant-mfa) - [What is Zero Trust Security?](https://www.okta.com/blog/identity-security/what-is-zero-trust-security) - [What Is Provisioning and Deprovisioning?](https://www.okta.com/blog/identity-security/what-is-provisioning-and-deprovisioning) - [Three ways Customer Identity supports data compliance and security](https://www.okta.com/blog/identity-security/three-ways-customer-identity-supports-data-compliance-and-security) - [What Is Social Login and Is It Worth Implementing?](https://www.okta.com/blog/identity-security/social-login) - [What are Salted Passwords and Password Hashing?](https://www.okta.com/blog/identity-security/what-are-salted-passwords-and-password-hashing) - [Security Questions: Best Practices, Examples, and Ideas](https://www.okta.com/blog/identity-security/security-questions) - [Secure device access: The missing key to your security strategy](https://www.okta.com/blog/identity-security/secure-device-access-the-missing-key-to-your-security-strategy) - [The real value of passwordless authentication](https://www.okta.com/blog/identity-security/the-real-value-of-passwordless-authentication) - [Join the Passwordless Revolution: Stop Making People Use Passwords](https://www.okta.com/blog/identity-security/join-the-passwordless-revolution-stop-making-people-use-passwords) - [Improve security, reduce Identity sprawl, and manage accounts with Secure SaaS Service Accounts ](https://www.okta.com/blog/identity-security/improve-security-reduce-identity-sprawl-and-manage-accounts-with-secure-saas-service) - [What Is Identity Governance and Administration?](https://www.okta.com/blog/identity-security/identity-governance-and-administration) - [3 ways Okta can help you improve your security posture and respect privacy-forward human rights](https://www.okta.com/blog/identity-security/3-ways-okta-can-help-you-improve-your-security-posture-and-respect-privacy-forward) - [What Is Attribute-Based Access Control (ABAC)?](https://www.okta.com/blog/identity-security/attribute-based-access-control-abac) - [How we went passwordless at Okta](https://www.okta.com/blog/identity-security/how-we-went-passwordless-at-okta) - [Control Identity sprawl with Okta Identity Security Posture Management](https://www.okta.com/blog/identity-security/control-identity-sprawl-with-okta-identity-security-posture-management) - [Future-ready workforce protection: The case for Identity-powered security in financial services](https://www.okta.com/blog/identity-security/future-ready-workforce-protection-the-case-for-identity-powered-security-in-financial) - [Embracing Zero Trust with Okta: A modern path to IT security](https://www.okta.com/blog/identity-security/embracing-zero-trust-with-okta-a-modern-path-to-it-security) - [How to choose the right MFA for your small business](https://www.okta.com/blog/identity-security/how-to-choose-the-right-mfa-for-your-small-business-0) - [Introducing the Okta Secure Identity Commitment](https://www.okta.com/blog/identity-security/introducing-the-okta-secure-identity-commitment) - [What Is Biometric Authentication?](https://www.okta.com/blog/identity-security/biometric-authentication) - [An Exploration of Open Identity Standards](https://www.okta.com/blog/identity-security/exploration-of-open-identity-standards) - [Identity Security Posture Management: A new sheriff in town](https://www.okta.com/blog/identity-security/identity-security-posture-management-a-new-sheriff-in-town) - [What Is Data Misuse?](https://www.okta.com/blog/identity-security/data-misuse) - [What Are ICAM and FICAM?](https://www.okta.com/blog/identity-security/icam-and-ficam) - [Identity-led resilience: The new business imperative](https://www.okta.com/blog/identity-security/identity-led-resilience-the-new-business-imperative) - [How centralized Identity solutions streamline security and resident engagement](https://www.okta.com/blog/identity-security/how-centralized-identity-solutions-streamline-security-and-resident-engagement-0) - [Beyond MFA: Identity is evolving for a complicated world](https://www.okta.com/blog/identity-security/beyond-mfa-identity-is-evolving-for-a-complicated-world) - [Cybersecurity for the world’s most vulnerable](https://www.okta.com/blog/identity-security/cybersecurity-for-the-worlds-most-vulnerable) - [CIBA: Authenticate customers in call centers and other out-of-band scenarios](https://www.okta.com/blog/identity-security/ciba-authenticate-customers-in-call-centers-and-other-out-of-band-scenarios) - [A summary of Okta’s FIPS compliance](https://www.okta.com/blog/identity-security/a-summary-of-oktas-fips-compliance) - [How Okta simplifies NIS2 compliance: a deep dive](https://www.okta.com/blog/identity-security/how-okta-simplifies-nis2-compliance-a-deep-dive) - [Top 10 Ways To Automate IT & Security Tasks With Okta Workflows](https://www.okta.com/blog/identity-security/automate-it-security) - [How Okta is helping society prepare for future cyberthreats](https://www.okta.com/blog/identity-security/how-okta-is-helping-society-prepare-for-future-cyberthreats) - [6 Steps to Practice Strong Laptop Security](https://www.okta.com/blog/identity-security/6-steps-to-practice-strong-laptop-security) - [Okta Workflows How-To: Determine User Sign-In Location](https://www.okta.com/blog/identity-security/determine-user-sign-in-location) - [How Okta can help meet CMMC 2.0 Identity and Access Management requirements](https://www.okta.com/blog/identity-security/how-okta-can-help-meet-cmmc-2-0-identity-and-access-management-requirements) - [Contextual Access Management: What Does It Actually Mean?](https://www.okta.com/blog/identity-security/contextual-access-management-what-does-it-actually-mean) - [Help reshape Identity security: Join the IPSIE working group ](https://www.okta.com/blog/identity-security/help-reshape-identity-security-join-the-ipsie-working-group) - [Passkeys 101: What they are and how they will replace passwords](https://www.okta.com/blog/identity-security/passkeys-101-what-they-are-and-how-they-will-replace-passwords) - [MFA Fatigue: A Growing Security Concern](https://www.okta.com/blog/identity-security/mfa-fatigue-growing-security-concern) - [Leveraging Identity to discover vulnerabilities and determine proper access](https://www.okta.com/blog/identity-security/leveraging-identity-to-discover-vulnerabilities-and-determine-proper-access) - [Highly Regulated Identity: The key to easier, more secure customer interactions](https://www.okta.com/blog/identity-security/highly-regulated-identity-the-key-to-easier-more-secure-customer-interactions) - [Okta’s commitment to CAEP and SSF: Pioneering secure, interoperable Identity standards](https://www.okta.com/blog/identity-security/oktas-commitment-to-caep-and-ssf-pioneering-secure-interoperable-identity-standards) - [What Is a Password Manager and Is It Safe to Use One?](https://www.okta.com/blog/identity-security/password-manager) - [Least privilege for your critical Identity roles: Introducing ‘Govern Okta Admin Roles’](https://www.okta.com/blog/identity-security/least-privilege-for-your-critical-identity-roles-introducing-govern-okta-admin-roles) - [Need to evolve your authorization strategy? Five questions to ask](https://www.okta.com/blog/identity-security/need-to-evolve-your-authorization-strategy-five-questions-to-ask) - [How to Manage Linux Identities Without LDAP](https://www.okta.com/blog/identity-security/how-to-manage-linux-identities-without-ldap) - [Leveraging Okta MFA to Secure Access and Adopt Windows Hello for Business](https://www.okta.com/blog/identity-security/leveraging-okta-mfa-to-secure-access-and-adopt-windows-hello-for-business) - [Overcoming security team challenges with cloud and SaaS local accounts](https://www.okta.com/blog/identity-security/overcoming-security-team-challenges-with-cloud-and-saas-local-accounts) - [Today’s Mobile Security Threats: What Are They and How Can You Prevent Them?](https://www.okta.com/blog/identity-security/mobile-security-threats-and-prevention) - [Meet regulatory, framework, and standards obligations with Okta Identity Governance](https://www.okta.com/blog/identity-security/meet-regulatory-framework-and-standards-obligations-with-okta-identity-governance) - [Resilience redefined: Strengthening Identity availability](https://www.okta.com/blog/identity-security/resilience-redefined-strengthening-identity-availability) - [What Is Multi-Factor Authentication (MFA)?](https://www.okta.com/blog/identity-security/multi-factor-authentication-mfa) - [Close of acquisition: Spera Security joins forces with Okta to advance Identity-powered security](https://www.okta.com/blog/identity-security/okta-acquisition-advances-identity-powered-security) - [Password spraying detection: Where do I start?](https://www.okta.com/blog/identity-security/password-spraying-detection-where-to-start) - [Leveraging Identity to detect and respond to potential attacks faster](https://www.okta.com/blog/identity-security/leveraging-identity-to-detect-and-respond-to-potential-attacks-faster) - [Leveraging Identity to enforce secure-by-design access policies](https://www.okta.com/blog/identity-security/leveraging-identity-to-enforce-secure-by-design-access-policies) - [Agent security: 3 tips to step up your Active Directory agent game](https://www.okta.com/blog/identity-security/agent-security-3-tips-to-step-up-your-active-directory-agent-game) - [Authorization BACk to basics: RBAC vs. ReBAC](https://www.okta.com/blog/identity-security/authorization-back-to-basics-rbac-vs-rebac) - [What Is Data Theft?](https://www.okta.com/blog/identity-security/data-theft) - [Battling Bots: The Identity Threat Level (ITL)](https://www.okta.com/blog/identity-security/battling-bots-the-identity-threat-level-itl) - [Cybersecurity your users can love](https://www.okta.com/blog/identity-security/cybersecurity-your-users-can-love) - [9 Admin Best Practices to Keep your Org Secure](https://www.okta.com/blog/identity-security/9-admin-best-practices-to-keep-your-org-secure) - [Device flow and Okta: Shared device authentication for consumers](https://www.okta.com/blog/identity-security/device-flow-and-okta-shared-device-authentication-for-consumers) - [Modern identity at work: Productivity meets security](https://www.okta.com/blog/identity-security/modern-identity-at-work-productivity-meets-security) - [Identity governance: Converged vs. disparate models](https://www.okta.com/blog/identity-security/identity-governance-converged-vs-disparate-models) - [Insights from our experience: Okta deploys Okta Device Access](https://www.okta.com/blog/identity-security/insights-from-our-experience-okta-deploys-okta-device-access) - [The problem with legacy thinking around identity security](https://www.okta.com/blog/identity-security/the-problem-with-legacy-thinking-around-identity-security) - [The surprising details behind your MFA enforcement status](https://www.okta.com/blog/identity-security/the-surprising-details-behind-your-mfa-enforcement-status) - [Adding passkeys to your apps with Okta CIC powered by Auth0](https://www.okta.com/blog/product-innovation/adding-passkeys-to-your-apps-with-okta-cic-powered-by-auth0) - [Flowcase 2022: Celebrating Okta Workflows Leaders Driving Innovation in Identity Automation](https://www.okta.com/blog/product-innovation/flowcase-2022-celebrating-okta-workflows-leaders-driving-innovation-in-identity) - [Actions Templates to power extensibility with Okta CIC Powered by Auth0](https://www.okta.com/blog/product-innovation/actions-templates-to-power-extensibility-with-okta-cic-powered-by-auth0) - [An Automated Approach to Convert Okta System Logs into Open Cybersecurity Schema Framework (OCSF) Schema](https://www.okta.com/blog/product-innovation/an-automated-approach-to-convert-okta-system-logs-into-open-cybersecurity-schema) - [CIAM by example: Four recipes to improve security and UX](https://www.okta.com/blog/product-innovation/ciam-by-example-four-recipes-to-improve-security-and-ux) - [Build your app or service right from the get-go](https://www.okta.com/blog/product-innovation/build-your-app-or-service-right-from-the-get-go) - [Extend your passwordless journey to device login](https://www.okta.com/blog/product-innovation/extend-your-passwordless-journey-to-device-login) - [99.99% Uptime For Every Customer](https://www.okta.com/blog/product-innovation/99-point-99-percent-uptime-for-all) - [Okta Workflows How-To: Find the JSON Object Passed From a Streaming Action to a Helper Flow](https://www.okta.com/blog/product-innovation/find-the-json-object-passed-from-streaming-to-helper-flow) - [Go beyond the login box with Customer Identity Cloud](https://www.okta.com/blog/product-innovation/go-beyond-the-login-box-with-customer-identity-cloud) - [CIAM by example in four recipes: Prevent fraudulent activity](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-prevent-fraudulent-activity) - [Beyond login: Enabling rapid innovation for SaaS](https://www.okta.com/blog/product-innovation/beyond-login-enabling-rapid-innovation-for-saas) - [Customer Identity Cloud and accessible authentication](https://www.okta.com/blog/product-innovation/customer-identity-cloud-and-accessible-authentication) - [Learn How to Automate Identity Processes With Workflows: 11 Online Meetups Recordings](https://www.okta.com/blog/product-innovation/automate-identity-processes-with-workflows) - [Desktop MFA from Okta — Its time has come](https://www.okta.com/blog/product-innovation/desktop-mfa-from-okta-its-time-has-come) - [CIAM by example in four recipes: Build for data privacy and compliance](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-build-for-data-privacy-and-compliance) - [Enhanced security and phishing resistance for unmanaged iOS devices with Okta FastPass](https://www.okta.com/blog/product-innovation/enhanced-security-and-phishing-resistance-for-unmanaged-ios-devices-with-okta-fastpass) - [CIAM by example in four recipes: Send data to marketing for personalization](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-send-data-to-marketing-for-personalization) - [Configuring Progressive Profiling for Your Custom Apps](https://www.okta.com/blog/product-innovation/configuring-progressive-profiling-for-your-custom-apps) - [A leap forward in token security: Okta adds support for DPoP](https://www.okta.com/blog/product-innovation/a-leap-forward-in-token-security-okta-adds-support-for-dpop) - [Automating Security Operations with Okta Workflows](https://www.okta.com/blog/product-innovation/automating-security-operations-with-okta-workflows) - [CIAM by example in four recipes: Add passwordless auth with passkeys ](https://www.okta.com/blog/product-innovation/ciam-by-example-in-four-recipes-add-passwordless-auth-with-passkeys) - [Understanding Okta Workflows Events](https://www.okta.com/blog/product-innovation/okta-workflows-events) - [Okta Workflows is audit ready for FedRAMP High](https://www.okta.com/blog/product-innovation/okta-workflows-is-audit-ready-for-fedramp-high) - [Customize signup and login with Forms, Okta’s no-code extensibility feature now Generally Available](https://www.okta.com/blog/product-innovation/okta-forms-now-generally-available) - [Okta Privileged Access and simplified developer experiences: The latest in Okta product capabilities](https://www.okta.com/blog/product-innovation/okta-privileged-access-and-simplified-developer-experiences-the-latest-in-okta-product) - [New in Workflows: Security Operations Solution Packs](https://www.okta.com/blog/product-innovation/new-in-workflows-security-operations-solution-packs) - [Secure On-Premises Solutions with Okta: Secret Features + a Preview](https://www.okta.com/blog/product-innovation/secure-on-premises-solutions-with-okta-secret-features-a-preview) - [Okta Device Access: Identity-powered security starts at power up](https://www.okta.com/blog/product-innovation/okta-device-access-identity-powered-security-starts-at-power-up) - [Okta FastPass: Phishing-resistant MFA](https://www.okta.com/blog/product-innovation/okta-fastpass-phishing-resistant-mfa) - [Okta Fine Grained Authorization is now available in private cloud on AWS](https://www.okta.com/blog/product-innovation/okta-fine-grained-authorization-is-now-available-in-private-cloud-on-aws) - [Okta Workflows joins the Okta Developer Forum](https://www.okta.com/blog/product-innovation/okta-workflows-joins-the-okta-developer-forum) - [Okta Passkey Management: A New Feature Flag](https://www.okta.com/blog/product-innovation/okta-passkey-management-a-new-feature-flag) - [Okta Workflows How-To: Read a Custom User Profile Attribute](https://www.okta.com/blog/product-innovation/read-a-custom-user-profile-attribute) - [Okta’s Redesigned End User Dashboard - Now 50% Faster!](https://www.okta.com/blog/product-innovation/oktas-redesigned-end-user-dashboard-now-50-faster) - [Okta launches Okta Verify for Apple Vision Pro ](https://www.okta.com/blog/product-innovation/okta-launches-okta-verify-for-apple-vision-pro) - [Build Workflows API Connectors with the Connector Builder](https://www.okta.com/blog/product-innovation/workflows-connector-builder) - [New in Workflows: Organize Your Flows in Folders and Subfolders](https://www.okta.com/blog/product-innovation/organize-your-flows-in-folders-and-subfolders) - [Okta Identity Security Posture Management and Workflows: Automated detection and remediation of local accounts](https://www.okta.com/blog/product-innovation/okta-identity-security-posture-management-and-workflows-automated-detection-and) - [Okta FastPass: Authorized at FedRAMP High and supports Authentication Assurance Level 3 (AAL3)](https://www.okta.com/blog/product-innovation/okta-fastpass-the-modern-authenticator-the-public-sector-deserves) - [Ready to deliver better customer experiences? No-code Identity orchestration is your answerx](https://www.okta.com/blog/product-innovation/ready-to-deliver-better-customer-experiences-no-code-identity-orchestration-is-your) - [Okta Workflows How-To: Anything as a Source](https://www.okta.com/blog/product-innovation/okta-workflows-anything-as-a-source) - [Passkeys are Generally Available](https://www.okta.com/blog/product-innovation/passkeys-are-generally-available) - [Okta Workflows How-To: Setup a Workflows Helper Flow (With For-Each and Streaming Cards)](https://www.okta.com/blog/product-innovation/setup-a-workflows-helper-flow-with-for-each-and-streaming-cards) - [Okta Workflows How-To: Sending Automatic Emails to Groups Based on Employee Department](https://www.okta.com/blog/product-innovation/okta-workflows-automatic-emails) - [Setting the bar for Authz: Okta Fine Grained Authorization is now Generally Available](https://www.okta.com/blog/product-innovation/setting-the-bar-for-authz-okta-fine-grained-authorization-is-now-generally-available) - [Okta to improve user experience through Apple Business Manager](https://www.okta.com/blog/product-innovation/okta-to-improve-user-experience-through-apple-business-manager) - [New Dashboard role for Organizations support staff](https://www.okta.com/blog/product-innovation/new-dashboard-role-for-organizations-support-staff) - [Okta Privileged Access is generally available](https://www.okta.com/blog/product-innovation/okta-privileged-access-is-generally-available) - [New in Okta Workflows: 30-day Trial, Cancel Flow, monday.com and SFTP Connectors, and New Templates](https://www.okta.com/blog/product-innovation/new-in-workflows-free-trial-connectors-templates) - [Okta’s enhanced smart card auth helps keep gov resources safe](https://www.okta.com/blog/product-innovation/oktas-enhanced-smart-card-auth-helps-keep-gov-resources-safe) - [Okta Workflows Educational Resources – March 2024](https://www.okta.com/blog/product-innovation/workflows-resources-march-2024) - [Workflows for Customer Identity Cloud (CIC): Automating and customizing Identity processes with no-code](https://www.okta.com/blog/product-innovation/workflows-for-customer-identity-cloud) - [Okta and AWS Identity Center enforce JIT-privileged access](https://www.okta.com/blog/product-innovation/okta-and-aws-identity-center-enforce-jit-privileged-access) - [Understanding Okta Workflows Connectors](https://www.okta.com/blog/product-innovation/okta-workflows-connectors) - [Okta’s Redesigned Admin Console and Dashboard — Now in GA!](https://www.okta.com/blog/product-innovation/oktas-redesigned-admin-console-and-dashboard-now-in-ga) - [Cooking up success:Get familiar with Okta Workflows features to unlock no-code automation](https://www.okta.com/blog/product-innovation/cooking-up-successget-familiar-with-okta-workflows-features-to-unlock-no-code) - [New in Workflows: Low-Latency Flows Can Now Run Up to 10 Times Faster](https://www.okta.com/blog/product-innovation/low-latency-flows-can-now-run-up-to-10-times-faster) - [Fine Grained Authorization and new Okta Privileged Access features: The latest in Okta product capabilities](https://www.okta.com/blog/product-innovation/fine-grained-authorization-and-new-okta-privileged-access-features-the-latest-in-okta) - [Okta Workflows How-To: Iterate Over Rows in a Table](https://www.okta.com/blog/product-innovation/iterate-over-rows-in-a-table-in-okta-workflows) - [Faster, easier, and more secure customer logins with passkeys in Okta](https://www.okta.com/blog/product-innovation/faster-easier-and-more-secure-customer-logins-with-passkeys-in-okta) - [Okta Workflows How-To: Fix the 403 Forbidden Error When Using Search Systems Logs Card](https://www.okta.com/blog/product-innovation/fix-the-403-forbidden-error-when-using-search-systems-logs-card) - [Fine Grained Authorization: A flexible solution for all](https://www.okta.com/blog/product-innovation/fine-grained-authorization-a-flexible-solution-for-all) - [Okta Workflows How-To: How to Delete Deactivated Users](https://www.okta.com/blog/product-innovation/how-to-delete-deactivated-users) - [Connecting your HR system to Okta](https://www.okta.com/blog/product-innovation/connecting-your-hr-system-to-okta) - [Better together: Using the Okta integration with HashiCorp Terraform](https://www.okta.com/blog/product-innovation/better-together-using-the-okta-integration-with-hashicorp-terraform) - [Launch Week '24: Oktane edition](https://www.okta.com/blog/product-innovation/launch-week-24-oktane-edition) - [How Okta + AWS IAM Identity Center Simplifies Admin and Adds CLI Support](https://www.okta.com/blog/product-innovation/how-okta-aws-iam-identity-center-simplifies-admin-and-adds-cli-support) - [Okta Workflows How-To: Iterate Over Items and Create a New List (Using the List – Map Card)](https://www.okta.com/blog/product-innovation/iterate-over-items-and-create-a-new-list) - [Okta Identity Governance: A Unified IAM and Governance Solution](https://www.okta.com/blog/product-innovation/introducing-okta-identity-governance) - [Customer Identity Cloud enhancements to prevent account takeover](https://www.okta.com/blog/product-innovation/customer-identity-cloud-enhancements-to-prevent-account-takeover) - [Innovation Ignited: How technologists spark innovation with Identity](https://www.okta.com/blog/product-innovation/innovation-ignited-how-technologists-spark-innovation-with-identity) - [Leveraging Realms to manage your complex workforce](https://www.okta.com/blog/product-innovation/leveraging-realms-to-manage-your-complex-workforce) - [Innovation ignited: How product leaders fuel innovation with digital Identity](https://www.okta.com/blog/product-innovation/innovation-ignited-how-product-leaders-fuel-innovation-with-digital-identity) - [Automate Active Directory cleanup with Okta Workflows and Open AI](https://www.okta.com/blog/product-innovation/automate-active-directory-cleanup-with-okta-workflows-and-open-ai) - [Announcing Entitlement Management for Okta Identity Governance](https://www.okta.com/blog/product-innovation/announcing-entitlement-management-for-okta-identity-governance) - [Okta Workflows Tutorial: Import Users from Google Sheets and Create Users in Okta](https://www.okta.com/blog/product-innovation/import-users-from-google-sheets-create-users-in-okta) - [Jumpstart Identity with automation](https://www.okta.com/blog/product-innovation/jumpstart-identity-with-automation) - [Five Okta Workflows Resources You Must Know About](https://www.okta.com/blog/product-innovation/five-okta-workflows-resources) - [FastPass expands phishing resistance with device-bound passcode option](https://www.okta.com/blog/product-innovation/fastpass-expands-phishing-resistance-with-device-bound-passcode-option) - [How Okta’s New Plaid Integration Keeps Your Banking Secure](https://www.okta.com/blog/product-innovation/how-oktas-new-plaid-integration-keeps-your-banking-secure) - [Okta Workflows How-To: Build a Custom Connector in Okta Workflows, a 7-Part Video Series](https://www.okta.com/blog/product-innovation/build-custom-connector-in-okta-workflows) - [How an IL4 Identity Provider Successfully Services IL5 Environments](https://www.okta.com/blog/product-innovation/how-an-il4-identity-provider-successfully-services-il5-environments) - [Introduction to Okta Workflows](https://www.okta.com/blog/product-innovation/introduction-to-okta-workflows) - [New in Okta Workflows: Duplicate Cards, New Connectors and Templates](https://www.okta.com/blog/product-innovation/new-in-workflows-duplicate-cards) - [Okta expands device assurance with Google Chrome integration](https://www.okta.com/blog/product-innovation/okta-expands-device-assurance-with-google-chrome-integration) - [Introducing Anything-as-a-Source](https://www.okta.com/blog/product-innovation/introducing-anything-as-a-source) - [Magic Links: Passwordless Login for Your Users](https://www.okta.com/blog/product-innovation/magic-links) - [Introducing Okta’s Secure Identity Assessment: Your path to reducing Identity debt](https://www.okta.com/blog/product-innovation/introducing-oktas-secure-identity-assessment-your-path-to-reducing-identity-debt) - [How to use Webhooks with Okta](https://www.okta.com/blog/product-innovation/how-to-use-webhooks-with-okta) - [Introducing Okta's Identity Adoption Model for Zero Trust](https://www.okta.com/blog/product-innovation/introducing-oktas-identity-adoption-model-for-zero-trust) - [Improved login for SaaS users](https://www.okta.com/blog/product-innovation/improved-login-for-saas-users) - [Launch Week ‘24: Customer Identity Solution edition](https://www.okta.com/blog/product-innovation/launch-week-24-customer-identity-solution-edition) - [Okta Privileged Access launches in Asia Pacific](https://www.okta.com/blog/product-innovation/okta-privileged-access-launches-in-asia-pacific) - [Learn to Integrate Okta and Oracle Weblogic with the LDAP Interface](https://www.okta.com/blog/product-innovation/learn-to-integrate-okta-and-oracle-weblogic-with-the-ldap-interface) - [Introducing new icons for our flagship product lines](https://www.okta.com/blog/product-innovation/introducing-new-icons-for-our-flagship-product-lines) - [New enhancements to the Workforce Identity Cloud's unified security solution announced at Oktane 2024](https://www.okta.com/blog/product-innovation/new-enhancements-to-the-workforce-identity-clouds-unified-security-solution-announced) - [Launch Week ‘24: Oktane edition — Customer Identity Solution](https://www.okta.com/blog/product-innovation/launch-week-24-oktane-edition-customer-identity-solution) - [Multiple brand experiences in a single org — made easy](https://www.okta.com/blog/product-innovation/multiple-brand-experiences-in-a-single-org-made-easy) - [Inbound SCIM for Okta Customer Identity Cloud is now Generally Available](https://www.okta.com/blog/product-innovation/inbound-scim-for-okta-customer-identity-cloud-is-now-generally-available) - [Okta Workflows authorized at FedRAMP High: A new era of secure automation for the U.S. Public Sector](https://www.okta.com/blog/product-innovation/okta-workflows-authorized-at-fedramp-high-a-new-era-of-secure-automation-for-the-u-s) - [Okta Workflows How-To: Read a JSON Path With Dot-Notation](https://www.okta.com/blog/product-innovation/how-to-read-a-json-path-with-dot-notation) - [Okta Workflows How-To: Iterate Over a JSON Object (or How to Use the Object – For Each Card)](https://www.okta.com/blog/product-innovation/iterate-over-a-json-object) - [Innovation ignited: How development leaders make authentication an innovation engine](https://www.okta.com/blog/product-innovation/innovation-ignited-how-development-leaders-make-authentication-an-innovation-engine) - [Okta Workflows How-To: Use Workflows for Inline Hooks](https://www.okta.com/blog/product-innovation/how-to-use-workflows-for-inline-hooks) - [What is Okta’s Financial Grade Identity™?](https://www.okta.com/blog/product-innovation/okta-financial-grade-identity) - [Okta Customer Identity Cloud for SaaS Apps Explained](https://www.okta.com/blog/product-innovation/okta-cic-for-saas-apps) - [Innovation ignited: How security leaders enable innovation with Identity](https://www.okta.com/blog/product-innovation/innovation-ignited-how-security-leaders-enable-innovation-with-identity) - [How Kyocera AVX Maximizes Security and Efficiency with Okta Workflows and Splunk](https://www.okta.com/blog/customers-and-partners/how-kyocera-avx-maximizes-security-and-efficiency-with-okta-workflows-and-splunk) - [How Identity is helping Varo Bank and JCB streamline compliance and deliver value to their workforce](https://www.okta.com/blog/customers-and-partners/how-identity-is-helping-varo-bank-and-jcb-streamline-compliance-and-deliver-value-to) - [Answering children in crisis with cloud technology](https://www.okta.com/blog/customers-and-partners/answering-children-in-crisis-with-cloud-technology) - [Akumin scales Identity management processes with Okta Workflows](https://www.okta.com/blog/customers-and-partners/akumin-scales-identity-management-processes-with-okta-workflows) - [How BeyondID closes digital gaps with Okta connectors](https://www.okta.com/blog/customers-and-partners/how-beyondid-closes-digital-gaps-with-okta-connectors) - [AWS AppFabric and Okta streamline access and authorization](https://www.okta.com/blog/customers-and-partners/aws-appfabric-and-okta-streamline-access-and-authorization) - [How Thoughtworks solves the big (and small) problems with Okta Workflows](https://www.okta.com/blog/customers-and-partners/how-thoughtworks-solves-the-big-and-small-problems-with-okta-workflows) - [Customers Name Okta as Top Choice for IGA](https://www.okta.com/blog/customers-and-partners/customers-name-okta-as-top-choice-for-iga) - [How Identity accelerates M&A for Mars and Warner Bros. Discovery](https://www.okta.com/blog/customers-and-partners/how-identity-accelerates-ma-for-mars-and-warner-bros-discovery) - [How Okta CIC is driving revenue and engagement in higher ed](https://www.okta.com/blog/customers-and-partners/how-okta-cic-is-driving-revenue-and-engagement-in-higher-ed) - [Built for growth: how Okta and AWS power smart manufacturing](https://www.okta.com/blog/customers-and-partners/built-for-growth-how-okta-and-aws-power-smart-manufacturing) - [How Okta and AWS are securing trust in healthcare](https://www.okta.com/blog/customers-and-partners/how-okta-and-aws-are-securing-trust-in-healthcare) - [Creating a secure environment for teachers and students to harness emerging technology](https://www.okta.com/blog/customers-and-partners/creating-a-secure-environment-for-teachers-and-students-to-harness-emerging-technology) - [Here's How Okta is Elevating the Partner Experience](https://www.okta.com/blog/customers-and-partners/heres-how-okta-is-elevating-the-partner-experience) - [Beyond the perimeter: How Okta, CrowdStrike, and Zscaler deliver end-to-end Zero Trust](https://www.okta.com/blog/customers-and-partners/beyond-the-perimeter-how-okta-crowdstrike-and-zscaler-deliver-end-to-end-zero-trust) - [Driving retail growth with Okta and AWS](https://www.okta.com/blog/customers-and-partners/driving-retail-growth-with-okta-and-aws) - [Introducing Universal Logout for all Adaptive MFA customers](https://www.okta.com/blog/company-and-culture/introducing-universal-logout-for-all-adaptive-mfa-customers) - [Working hard, living fully: My experience at Okta](https://www.okta.com/blog/company-and-culture/working-hard-living-fully-my-experience-at-okta) - [The next chapter for Okta Privileged Access: Integrating Axiom to accelerate our roadmap](https://www.okta.com/blog/company-and-culture/the-next-chapter-for-okta-privileged-access-integrating-axiom-to-accelerate-our) - [Spotlight on Preston King: A pillar of support, innovation, and leadership in the “What’s Next” program](https://www.okta.com/blog/company-and-culture/spotlight-on-preston-king-a-pillar-of-support-innovation-and-leadership-in-the-whats) - [From athlete to award-winning sales professional: Growing my sales career at Okta](https://www.okta.com/blog/company-and-culture/from-athlete-to-award-winning-sales-professional-growing-my-sales-career-at-okta) - [Three years of Okta’s nonprofit technology fellowship](https://www.okta.com/blog/company-and-culture/three-years-of-oktas-nonprofit-technology-fellowship-0) - [The State of Inclusion at Okta: Working to integrate equity](https://www.okta.com/blog/company-and-culture/the-state-of-inclusion-at-okta-working-to-integrate-equity) - [Okta Badges vs. Okta Certification: Understanding the difference and why you should get one](https://www.okta.com/blog/company-and-culture/okta-badges-vs-okta-certification-understanding-the-difference-and-why-you-should-get) - [Uninterruptible testing at Okta](https://www.okta.com/blog/company-and-culture/uninterruptible-testing-at-okta) - [Okta’s Newest Office: Hello, Bellevue!](https://www.okta.com/blog/company-and-culture/oktas-newest-office-hello-bellevue) - [Going green, growing together: Introducing Okta's partner sustainability badge](https://www.okta.com/blog/company-and-culture/going-green-growing-together-introducing-oktas-partner-sustainability-badge) - [The story behind Okta’s values](https://www.okta.com/blog/company-and-culture/the-story-behind-oktas-values) - [Growing our San Francisco Base: Welcome to our New HQ](https://www.okta.com/blog/company-and-culture/growing-our-san-francisco-base-welcome-to-our-new-hq) - [Spotlight on Cherry Yang: A journey of resilience, mentorship, and leadership in Identity](https://www.okta.com/blog/company-and-culture/spotlight-on-cherry-yang-a-journey-of-resilience-mentorship-and-leadership-in-identity) - [Okta’s Newest Office: Downtown Toronto!](https://www.okta.com/blog/company-and-culture/toronto-office-opening) - [Okta’s commitment to 100% renewable electricity: Powering positive change](https://www.okta.com/blog/company-and-culture/oktas-commitment-to-100-renewable-electricity-powering-positive-change) - [Why Okta is Privacy-Forward](https://www.okta.com/blog/company-and-culture/why-okta-is-privacy-forward) - [Founders in Focus: David Goldschlag of Aembit](https://www.okta.com/blog/company-and-culture/founders-in-focus-david-goldschlag-of-aembit) - [Oktane 2024: The future of Identity security](https://www.okta.com/blog/company-and-culture/oktane-2024-the-future-of-identity-security) - [Updated Okta Statement on LAPSUS$](https://www.okta.com/blog/company-and-culture/updated-okta-statement-on-lapsus) - [Spotlight on Dr. Peter Scheuermann: A story of perseverance, continuous learning, and community](https://www.okta.com/blog/company-and-culture/spotlight-on-dr-peter-scheuermann-a-story-of-continuous-learning-and-community) - [Scaling success: How the Oktane Ambassador Program unleashed the power of our people](https://www.okta.com/blog/industry-insights/scaling-success-how-the-oktane-ambassador-program-unleashed-the-power-of-our-people) - [What Is Data Security?](https://www.okta.com/blog/industry-insights/data-security) - [Using SIEM and Identity to Protect Against Data Breaches](https://www.okta.com/blog/industry-insights/using-siem-and-identity-to-protect-against-data-breaches) - [Usability and utility: How users establish usefulness](https://www.okta.com/blog/industry-insights/usability-and-utility-how-users-establish-usefulness) - [Security and sustainability through people, processes, and technology](https://www.okta.com/blog/industry-insights/security-and-sustainability-through-people-processes-and-technology) - [Identity as a catalyst: Transforming government culture in the digital age](https://www.okta.com/blog/industry-insights/identity-as-a-catalyst-transforming-government-culture-in-the-digital-age) - [Prevent toxic access combinations with Separation of Duties in Okta Identity Governance](https://www.okta.com/blog/industry-insights/prevent-toxic-access-combinations-with-separation-of-duties-in-okta-identity) - [What Is Identity Proofing?](https://www.okta.com/blog/industry-insights/what-is-identity-proofing) - [Oktane 2025 preview: Identity security as the public sector’s AI-ready control plane](https://www.okta.com/blog/industry-insights/oktane-2025-preview-identity-security-as-the-public-sectors-ai-ready-control-plane) - [Automating and extending advanced security operations with Workflows](https://www.okta.com/blog/industry-insights/automating-and-extending-advanced-security-operations-with-workflows) - [Building resident trust: How a seamless Identity platform transforms U.S. government services](https://www.okta.com/blog/industry-insights/building-resident-trust-how-a-seamless-identity-platform-transforms-u-s-government) - [Beyond human users: Why identity governance for AI agents is your next big challenge](https://www.okta.com/blog/industry-insights/beyond-human-users-why-identity-governance-for-ai-agents-is-your-next-big-challenge) - [Identity as the ultimate integrator](https://www.okta.com/blog/industry-insights/identity-as-the-ultimate-integrator) - [The Labubu blind box for your enterprise: Unmasking AI agents across industries](https://www.okta.com/blog/industry-insights/the-labubu-blind-box-for-your-enterprise-unmasking-ai-agents-across-industries) - [Unlocking SaaS Security: How Identity can help](https://www.okta.com/blog/industry-insights/unlocking-saas-security-how-identity-can-help) - [Making MFA mandatory for securing the admin console front door](https://www.okta.com/blog/industry-insights/making-mfa-mandatory-for-securing-the-admin-console-front-door) - [Founders in Focus: Itamar Golan of Prompt Security](https://www.okta.com/blog/company-and-culture/founders-in-focus-itamar-golan-of-prompt-security) - [Everyone means everyone: Okta's ongoing path to accessibility](https://www.okta.com/blog/company-and-culture/everyone-means-everyone-oktas-ongoing-path-to-accessibility) - [Beyond commitment: Okta’s journey towards racial equity](https://www.okta.com/blog/company-and-culture/beyond-commitment-oktas-journey-towards-racial-equity) - [Founders in Focus: Emanuel Salmona of Nagomi Security](https://www.okta.com/blog/company-and-culture/founders-in-focus-emanuel-salmona-of-nagomi-security) - [Five Game-changing lessons I learned as a Product Manager intern at Okta](https://www.okta.com/blog/company-and-culture/five-game-changing-lessons-i-learned-as-a-product-manager-intern-at-okta) - [Founders in Focus: Marshall Pribadi of Privy](https://www.okta.com/blog/company-and-culture/founders-in-focus-marshall-pribadi-of-privy) - [Founders in Focus: Rajeev Behera of Every](https://www.okta.com/blog/company-and-culture/founders-in-focus-rajeev-behera-of-every) - [Founders in Focus: Kieran Donovan of k-ID](https://www.okta.com/blog/company-and-culture/founders-in-focus-kieran-donovan-of-k-id) - [Coming soon: Okta Launch Week, July 15–19](https://www.okta.com/blog/company-and-culture/coming-soon-okta-launch-week-july-15-19) - [From engineer to leader: Thevie Chea’s success story at Okta](https://www.okta.com/blog/company-and-culture/from-engineer-to-leader-thevie-cheas-success-story-at-okta) - [Founders in Focus: Moty Jacob of SURF Security](https://www.okta.com/blog/company-and-culture/founders-in-focus-moty-jacob-of-surf-security) - [The impact of employee volunteering with Okta for Good](https://www.okta.com/blog/company-and-culture/employee-volunteering-with-okta-for-good) - [Cultivating an innovation culture — the power of hackathons](https://www.okta.com/blog/company-and-culture/cultivating-an-innovation-culture-the-power-of-hackathons) - [Amplifying the power of recognition with Oktappreciate](https://www.okta.com/blog/company-and-culture/amplifying-the-power-of-recognition-with-oktappreciate) - [Beyond compliance: Elevating Okta’s ESG with security and trust](https://www.okta.com/blog/company-and-culture/beyond-compliance-elevating-oktas-esg-with-security-and-trust) - [Behind the Scenes of Our Brand Evolution](https://www.okta.com/blog/company-and-culture/behind-the-scenes-of-our-brand-evolution) - [Announcing the 2023 Okta For Good Impact Report](https://www.okta.com/blog/company-and-culture/announcing-the-2023-okta-for-good-impact-report) - [Celebrating excellence: Okta’s Certified Technical Architects shine on the Nasdaq Tower](https://www.okta.com/blog/company-and-culture/celebrating-excellence-oktas-certified-technical-architects-shine-on-the-nasdaq-tower) - [Founders in Focus: Paul Klein IV of Browserbase](https://www.okta.com/blog/company-and-culture/founders-in-focus-paul-klein-iv-of-browserbase) - [Building a more secure world: Okta for Good’s $50 million, five-year commitment](https://www.okta.com/blog/company-and-culture/building-a-more-secure-world-okta-for-goods-50-million-five-year-commitment) - [Stay secure with FastPass and Trusted App Filters](https://www.okta.com/blog/product-innovation/stay-secure-with-fastpass-and-trusted-app-filters) - [Set Up API Connector Dynamic Input Fields in the Okta Workflows Connector Builder](https://www.okta.com/blog/product-innovation/workflows-connector-builder-action-dynamic-inputs) - [Introducing the Okta Devices SDK and API: A Better Way to Secure and Delight Mobile Users](https://www.okta.com/blog/product-innovation/showcase20-introducing-the-okta-devices-sdk-and-api-a-better-way-to-secure-and-delight-mobile-users) - [Unifying the look and feel of Okta’s products](https://www.okta.com/blog/product-innovation/unifying-the-look-and-feel-of-oktas-products) - [Simple and secure user experiences: The latest on Okta Customer Identity Solution](https://www.okta.com/blog/product-innovation/simple-and-secure-user-experiences-the-latest-on-okta-customer-identity-solution) - [Launch Week: Mid-Year Edition](https://www.okta.com/blog/product-innovation/launch-week-25-mid-year-update) - [Delegating macOS login authentication to Okta](https://www.okta.com/blog/product-innovation/delegating-macos-login-authentication-to-okta) - [Unlock SaaS growth with enterprise-ready identity](https://www.okta.com/blog/product-innovation/unlock-saas-growth-with-enterprise-ready-identity) - [Why you should migrate to OAuth 2.0 from static API tokens](https://www.okta.com/blog/product-innovation/why-you-should-migrate-to-oauth-2-0-from-static-api-tokens) - [Okta Workflows Tutorial: Notify When a User is Added to a Group (with Event Hook filtering)](https://www.okta.com/blog/product-innovation/workflows-event-hook-tutorial) - [Okta Workflows Tutorial: Send a Rich Message to Microsoft Teams for a New Okta Event Using Microsoft API](https://www.okta.com/blog/product-innovation/workflows-send-rich-message-with-microsoft-api) - [Okta Workflows How-To: Search for Groups Using Custom Search Criteria in Okta Workflows](https://www.okta.com/blog/product-innovation/search-for-groups-using-custom-search-criteria) - [A new way to buy Okta: Simplified solution pricing to unlock Workforce Identity](https://www.okta.com/blog/product-innovation/a-new-way-to-buy-okta-simplified-solution-pricing-to-unlock-workforce-identity) - [Okta Workflows Tutorial: Send an Email Notification for a New Okta Event](https://www.okta.com/blog/product-innovation/send-email-notification-okta-event) - [Using Okta for Conditional Access to AWS Assets with MFA Validation](https://www.okta.com/blog/product-innovation/using-okta-for-conditional-access-to-aws-assets) - [Learn About the Differences Between Three Workflows List Functions: For Each, Map, and Reduce](https://www.okta.com/blog/product-innovation/three-workflows-list-functions-for-each-map-and-reduce) - [Okta Workflows Tutorial: Send a Microsoft Teams Notification for a New Okta Event](https://www.okta.com/blog/product-innovation/workflows-send-microsoft-teams-notification) - [Secure your devices with Okta's Desktop MFA](https://www.okta.com/blog/product-innovation/secure-your-devices-with-oktas-desktop-mfa) - [One platform, every identity: Unifying Okta Customer Identity with Okta Workforce Identity](https://www.okta.com/blog/product-innovation/one-platform-every-identity-unifying-okta-customer-identity-with-okta-workforce) - [Solving authorization for B2B SaaS at Okta](https://www.okta.com/blog/product-innovation/solving-authorization-for-b2b-saas-at-okta) - [Okta Workflows Tutorial: Notify When A User Is Suspended](https://www.okta.com/blog/product-innovation/workflows-tutorial-notify-when-a-user-is-suspended) - [Using Redirect with Actions to gather user info and increase conversions](https://www.okta.com/blog/product-innovation/using-redirect-with-actions-to-gather-user-info-and-increase-conversions) - [Okta Workflows Tutorial: Build a Connector for Spotify API (with OAuth 2.0)](https://www.okta.com/blog/product-innovation/workflows-connector-builder-oauth-tutorial) - [Identity Threat Protection with Okta AI ](https://www.okta.com/blog/product-innovation/identity-threat-protection-with-okta-ai) - [Unveiling new and improved product features — 6 month lookback](https://www.okta.com/blog/product-innovation/unveiling-new-and-improved-product-features-6-month-lookback) - [Resilience redefined: Strengthening identity availability in EMEA and Australia](https://www.okta.com/blog/product-innovation/resilience-redefined-strengthening-identity-availability-in-emea-and-australia) - [Launch Week ‘25: Showcase edition](https://www.okta.com/blog/product-innovation/launch-week-25-showcase-edition) - [Okta introduces Custom Admin Roles for Identity Threat Protection with Okta AI](https://www.okta.com/blog/product-innovation/okta-introduces-custom-admin-roles-for-identity-threat-protection-with-okta-ai) - [Okta Workflows How-To: Write Output From the List Users Card to a CSV File](https://www.okta.com/blog/product-innovation/write-output-from-the-list-users-card-to-a-csv-file) - [Okta advances device context features for Zero Trust security](https://www.okta.com/blog/product-innovation/okta-advances-device-context-features-for-zero-trust-security) - [Establish device trust on Android with Okta Device Assurance](https://www.okta.com/blog/product-innovation/establish-device-trust-on-android-with-okta-device-assurance) - [Set Up API Connector Output Fields in the Okta Workflows Connector Builder](https://www.okta.com/blog/product-innovation/workflows-connector-builder-action-outputs) - [SSH is Dead. Long Live SSH: One Million SSH Logins with Okta. Zero SSH Keys.](https://www.okta.com/blog/product-innovation/ssh-is-dead-long-live-ssh-one-million-ssh-logins-with-okta-zero-ssh-keys) - [Go beyond patch management and enforce device compliance with extensible, real-time posture checks](https://www.okta.com/blog/product-innovation/go-beyond-patch-management-and-enforce-device-compliance-with-extensible-real-time) - [Okta Workflows Tutorial: Build a Connector for OpenWeather API](https://www.okta.com/blog/product-innovation/workflows-connector-builder-tutorial) - [Okta Workflows How-To: Six Ways to Trigger a Flow](https://www.okta.com/blog/product-innovation/six-ways-to-trigger-a-flow) - [Okta Workflows How-To: Set Up a Streaming Action Card for Search Results](https://www.okta.com/blog/product-innovation/set-up-a-streaming-action-card-for-search-results) - [Secure Access from Unmanaged Devices with Okta Device Assurance](https://www.okta.com/blog/product-innovation/secure-access-from-unmanaged-devices-with-okta-device-assurance) - [Okta Workflows How-To: Convert an Object to a List](https://www.okta.com/blog/product-innovation/convert-an-object-to-a-list) - [Marketing in a post-cookie world](https://www.okta.com/blog/industry-insights/marketing-in-a-post-cookie-world) - [Okta Applauds New US National Cybersecurity Strategy](https://www.okta.com/blog/industry-insights/okta-applauds-new-us-national-cybersecurity-strategy) - [CDP and CIAM: A match made in cookieless marketing heaven](https://www.okta.com/blog/industry-insights/cdp-and-ciam-a-match-made-in-cookieless-marketing-heaven) - [Organizations moving forward](https://www.okta.com/blog/industry-insights/organizations-moving-forward) - [Four best practices for adopting Okta Identity Engine](https://www.okta.com/blog/industry-insights/4-best-practices-for-adopting-oie) - [Best-of-Breed vs. Suites: Growth of Slack and Zoom Across the Okta Integration Network](https://www.okta.com/blog/industry-insights/best-of-breed-vs-suites-growth-of-slack-and-zoom-across-the-okta-integration-network) - [5 signs to upgrade your small business Identity solution](https://www.okta.com/blog/industry-insights/5-signs-to-upgrade-your-small-business-identity-solution) - [Customer Identity trends report shows control trumps convenience ](https://www.okta.com/blog/industry-insights/customer-identity-trends-report-shows-control-trumps-convenience) - [Nonprofits at Work 2024: Mission-critical tech and security](https://www.okta.com/blog/industry-insights/okta-nonprofit-businesses-at-work-2024) - [Maximizing ROI with Customer Identity: 5 Questions with a guest from Forrester](https://www.okta.com/blog/industry-insights/maximizing-roi-with-customer-identity-5-questions-with-a-guest-from-forrester) - [How to drive growth by modernizing Customer Identity](https://www.okta.com/blog/industry-insights/how-to-drive-growth-by-modernizing-customer-identity) - [All About IT Infrastructure: What it is and How it's Evolving](https://www.okta.com/blog/industry-insights/all-about-it-infrastructure-what-it-is-and-how-its-evolving) - [CCPA vs. GDPR: Similarities and Differences Explained](https://www.okta.com/blog/industry-insights/ccpa-vs-gdpr) - [How Development Teams Purchase SaaS](https://www.okta.com/blog/industry-insights/how-development-teams-purchase-saas) - [What Is Best-of-Breed Technology?](https://www.okta.com/blog/industry-insights/best-of-breed-technology) - [How strong governance can reduce your SaaS spend](https://www.okta.com/blog/industry-insights/how-strong-governance-can-reduce-your-saas-spend) - [More than SSO: Five SaaS features you need to win enterprise customers](https://www.okta.com/blog/industry-insights/more-than-sso-five-saas-features-you-need-to-win-enterprise-customers) - [Financial Services: Upgrade Your UX with a One-Identity Strategy ](https://www.okta.com/blog/industry-insights/financial-services-upgrade-your-ux-with-a-one-identity-strategy) - [Okta Welcomes the Biden-Harris Administration’s Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence](https://www.okta.com/blog/industry-insights/okta-welcomes-the-biden-harris-administrations-executive-order-on-safe-secure-and) - [How Identity gives SMBs a competitive edge](https://www.okta.com/blog/industry-insights/how-identity-gives-smbs-a-competitive-edge) - [Innovation ignited: How to start your digital Identity management journey](https://www.okta.com/blog/industry-insights/innovation-ignited-how-to-start-your-digital-identity-management-journey) - [DORA is coming. Are you ready? ](https://www.okta.com/blog/industry-insights/dora-is-coming-are-you-ready) - [Filling the third-party cookie gap with first-party and zero-party data](https://www.okta.com/blog/industry-insights/filling-the-third-party-cookie-gap-with-first-party-and-zero-party-data) - [PCI DSS 4.0: What financial service providers need to know about new regulatory requirements](https://www.okta.com/blog/industry-insights/pci-dss-4-0-what-financial-service-providers-need-to-know-about-new-regulatory) - [Recapping Cyber and Digital Identity Innovation Capitol Hill Day: Identity takes center stage at the US Capitol](https://www.okta.com/blog/industry-insights/recapping-cyber-and-digital-identity-innovation-capitol-hill-day-identity-takes-center) - [It’s time to look beyond the standard Zero Trust framework](https://www.okta.com/blog/industry-insights/its-time-to-look-beyond-the-standard-zero-trust-framework) - [Digital native businesses: Pioneering the digital landscape securely with CIAM](https://www.okta.com/blog/industry-insights/digital-native-businesses-pioneering-the-digital-landscape-securely-with-ciam) - [In with the Old, in with the New: Adapting Legacy Security Investments for the Modern World](https://www.okta.com/blog/industry-insights/in-with-the-old-in-with-the-new-adapting-legacy-security-investments-for-the-modern) - [What Is an API?](https://www.okta.com/blog/industry-insights/api-application-programming-interface) - [How to innovate under pressure](https://www.okta.com/blog/industry-insights/how-to-innovate-under-pressure) - [It’s official: Zero Trust now favored by 96% of organizations](https://www.okta.com/blog/industry-insights/its-official-zero-trust-now-favored-by-96-of-organizations) - [Risk-based policy-driven security with Device Logout](https://www.okta.com/blog/product-innovation/risk-based-policy-driven-security-with-device-logout) - [Okta leads the way: Driving real-time security with Shared Signals](https://www.okta.com/blog/product-innovation/okta-leads-the-way-driving-real-time-security-with-shared-signals) - [Boosting security with Okta Identity Threat Protection and Workflows](https://www.okta.com/blog/product-innovation/boosting-security-with-okta-identity-threat-protection-and-workflows) - [Okta participates in White House MFA symposium](https://www.okta.com/blog/company-and-culture/okta-participates-in-white-house-mfa-symposium) - [It’s Official: Okta Joins Forces With Auth0](https://www.okta.com/blog/company-and-culture/its-official-okta-joins-forces-with-auth0) - [How Our Core Values Shape Our Identity](https://www.okta.com/blog/company-and-culture/how-our-core-values-shape-our-identity) - [In Celebration of Vittorio Bertocci](https://www.okta.com/blog/company-and-culture/in-celebration-of-vittorio-bertocci) - [Okta Unveils Bold Brand Evolution ](https://www.okta.com/blog/company-and-culture/okta-unveils-bold-brand-evolution) - [Spotlight on Mimoh Das: A journey of resilience and growth with Okta's "What's Next" program](https://www.okta.com/blog/company-and-culture/spotlight-on-mimoh-das-a-journey-of-resilience-and-growth-with-oktas-whats-next) - [It’s here: Okta Launch Week July ‘24](https://www.okta.com/blog/company-and-culture/its-here-okta-launch-week-july-24) - [Okta on Okta: On a mission to enable, evolve, and showcase Okta](https://www.okta.com/blog/company-and-culture/okta-on-okta-on-a-mission-to-enable-evolve-and-showcase-okta) - [Inclusive Language at Okta](https://www.okta.com/blog/company-and-culture/inclusive-language-at-okta) - [Founders in Focus: Karine Mellata of Intrinsic](https://www.okta.com/blog/company-and-culture/founders-in-focus-karine-mellata-of-intrinsic) - [Okta joins the CNCF to shape the future of cloud computing](https://www.okta.com/blog/company-and-culture/okta-joins-the-cncf-to-shape-the-future-of-cloud-computing) - [Introducing “Mistaken Identity,” Okta’s new podcast](https://www.okta.com/blog/company-and-culture/introducing-mistaken-identity-oktas-new-podcast) - [Okta’s climate targets: Progress and opportunities one year in](https://www.okta.com/blog/company-and-culture/oktas-climate-targets-progress-and-opportunities-one-year-in) - [Okta Concludes its Investigation Into the January 2022 Compromise](https://www.okta.com/blog/company-and-culture/okta-concludes-its-investigation-into-the-january-2022-compromise) - [Okta Secure Identity Commitment: 2024 Year in Review | Highlights, Innovations, and What’s Next](https://www.okta.com/blog/company-and-culture/okta-secure-identity-commitment-2024-year-in-review-highlights-innovations-and-whats) - [Okta’s Investigation of the January 2022 Compromise](https://www.okta.com/blog/company-and-culture/oktas-investigation-of-the-january-2022-compromise) - [Introducing the Okta Community virtual Ask Me Anything series](https://www.okta.com/blog/company-and-culture/introducing-the-okta-community-virtual-ask-me-anything-series) - [Nonprofits Should Be As Powerful As Their Missions: Our $10 Million Commitment](https://www.okta.com/blog/company-and-culture/nonprofits-should-be-as-powerful-as-their-missions-our-10-million-commitment) - [Okta and beyond: Building a robust defense against web attacks](https://www.okta.com/blog/company-and-culture/okta-and-beyond) - [Introducing Okta’s FY24 Equity Accelerator cohort](https://www.okta.com/blog/company-and-culture/introducing-oktas-fy24-equity-accelerator-cohort) - [Okta CEO on Workforce Reduction](https://www.okta.com/blog/company-and-culture/message-okta-ceo) - [Launch Week: What’s new for Okta EMEA in Q2](https://www.okta.com/blog/company-and-culture/launch-week-whats-new-for-okta-emea-in-q2) - [Okta’s Commitment to Social and Environmental Responsibility](https://www.okta.com/blog/company-and-culture/oktas-commitment-to-social-and-environmental-responsibility) - [Inside Okta’s new brand campaign](https://www.okta.com/blog/company-and-culture/inside-oktas-new-brand-campaign) - [Recognizing trailblazers: Introducing The Identity 25 by Okta Ventures](https://www.okta.com/blog/company-and-culture/recognizing-trailblazers-introducing-the-identity-25-by-okta-ventures) - [Okta Achieves FedRAMP® High Authorization](https://www.okta.com/blog/company-and-culture/okta-achieves-fedrampr-high-authorization) - [Okta’s climate update: Scaling and building in 2024](https://www.okta.com/blog/company-and-culture/oktas-climate-update-scaling-and-building-in-2024) - [Okta’s Nonprofit Technology Fellowship: Empowering nonprofit technology leaders across the globe](https://www.okta.com/blog/company-and-culture/oktas-nonprofit-technology-fellowship-empowering-nonprofit-technology-leaders-across) - [Okta’s Innovation Lab: Revolutionizing nonprofit collaboration](https://www.okta.com/blog/company-and-culture/oktas-innovation-lab-revolutionizing-nonprofit-collaboration) - [Okta SaaS Startup Competition 2024 results: Showcasing innovation in Identity-driven tech](https://www.okta.com/blog/company-and-culture/okta-saas-startup-competition-2024-results-showcasing-innovation-in-identity-driven) - [Identity Insiders: Basketball coach turned Identity coach Jami Baker](https://www.okta.com/blog/company-and-culture/identity-insiders-basketball-coach-turned-identity-coach-jami-baker) - [What makes Okta one of the Best Workplaces in Tech? ](https://www.okta.com/blog/company-and-culture/what-makes-okta-one-of-the-best-workplaces-in-tech) - [Leading the way: Commemorating the establishment of our first Latinx Employee Network](https://www.okta.com/blog/company-and-culture/leading-the-way-commemorating-the-establishment-of-our-first-latinx-employee-network) - [Okta Celebrates International Transgender Day of Visibility with New Guide for Employees and Leaders](https://www.okta.com/blog/company-and-culture/okta-celebrates-international-transgender-day-of-visibility-with-new-guide) - [Okta For Good Innovation Lab: See how technology is enabling social progress](https://www.okta.com/blog/company-and-culture/okta-for-good-innovation-lab-see-how-technology-is-enabling-social-progress) - [Inside Okta: A summer of growth and connection at the Dublin office](https://www.okta.com/blog/company-and-culture/inside-okta-a-summer-of-growth-and-connection-at-the-dublin-office) - [Okta Commits to Climate Action with Approved Science-Based Targets](https://www.okta.com/blog/company-and-culture/okta-commits-to-climate-action) - [Q&A with Neville Vincent: Meet Okta’s Vice President, Asia](https://www.okta.com/blog/company-and-culture/qa-with-neville-vincent-meet-oktas-vice-president-asia) - [Enhancing security: Identity proofing for new hires](https://www.okta.com/blog/industry-insights/enhancing-security-identity-proofing-for-new-hires) - [To Enhance Patient Outcomes, Healthcare Providers Need to Invest in Digital Experiences](https://www.okta.com/blog/industry-insights/to-enhance-patient-outcomes-healthcare-providers-need-to-invest-in-digital-experiences) - [What is NLP?](https://www.okta.com/blog/industry-insights/what-is-nlp) - [Top 3 actions for technologists to help maximize the value of your business’ cybersecurity insurance](https://www.okta.com/blog/industry-insights/top-3-actions-for-technologists-to-help-maximize-the-value-of-your-business) - [SMB Identity buyer's checklist](https://www.okta.com/blog/industry-insights/smb-identity-buyers-checklist) - [SMBs at Work 2024: How are SMBs implementing security? We have answers.   ](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-how-are-smbs-implementing-security-we-have-answers) - [The hidden challenges of business partner access: How to stay secure and agile at scale](https://www.okta.com/blog/industry-insights/the-hidden-challenges-of-business-partner-access-how-to-stay-secure-and-agile) - [What the Tools Marketers Use Can Tell Us About This Current Moment ](https://www.okta.com/blog/industry-insights/what-the-tools-marketers-use-can-tell-us-about-this-current-moment) - [What is a Domain Name System (DNS)?](https://www.okta.com/blog/industry-insights/what-is-a-domain-name-system-dns) - [Time to Make a Work from Home Policy. Where Should You Start?](https://www.okta.com/blog/industry-insights/work-from-home-policy-guidelines-and-best-practices) - [State of Enterprise App Marketplaces: Learnings from a Milestone Anniversary](https://www.okta.com/blog/industry-insights/state-of-enterprise-app-marketplaces-learnings-from-a-milestone-anniversary) - [SMBs at Work 2024: Where SMBs are leading the way in automation](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-where-smbs-are-leading-the-way-in-automation) - [SMBs at Work 2024: Which apps are powering today’s growing companies?](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-which-apps-are-powering-todays-growing-companies) - [Identity: Free the people who power your business](https://www.okta.com/blog/industry-insights/identity-free-the-people-who-power-your-business) - [What is zero-party data and why does it matter now?](https://www.okta.com/blog/industry-insights/what-is-zero-party-data-and-why-does-it-matter-now) - [New Forrester study reveals: Okta Identity Governance can result in 211% ROI](https://www.okta.com/blog/industry-insights/new-forrester-study-reveals-okta-identity-governance-can-result-in-211-roi) - [Why Identity fuels speed for SMBs](https://www.okta.com/blog/industry-insights/why-identity-fuels-speed-for-smbs) - [How modern identity strategies shape enterprise security](https://www.okta.com/blog/industry-insights/how-modern-identity-strategies-shape-enterprise-security) - [SMBs at Work 2024: What apps make the SMB stack?](https://www.okta.com/blog/industry-insights/smbs-at-work-2024-what-apps-make-the-smb-stack) - [What Is Privileged Access Management?](https://www.okta.com/blog/industry-insights/what-is-privileged-access-management) - [Why Identity is the I in… High Impact Service Providers](https://www.okta.com/blog/industry-insights/why-identity-is-the-i-in-high-impact-service-providers) - [The future of farming hinges on digital access](https://www.okta.com/blog/industry-insights/the-future-of-farming-hinges-on-digital-access) - [Why now is the time for IAM transformation in banking](https://www.okta.com/blog/industry-insights/why-now-is-the-time-for-iam-transformation-in-banking) - [What you might not know about conversion rate optimization](https://www.okta.com/blog/industry-insights/what-you-might-not-know-about-conversion-rate-optimization) - [Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?](https://www.okta.com/blog/industry-insights/two-factor-authentication-vs-multi-factor-authentication-what-are-the-risks) - [Zero-party data and the future of personalization](https://www.okta.com/blog/industry-insights/zero-party-data-and-the-future-of-personalization) - [The Adaptability Imperative: Executives anticipate the unexpected for 2024 and beyond](https://www.okta.com/blog/industry-insights/the-adaptability-imperative-executives-anticipate-the-unexpected-for-2024-and-beyond) - [Predictions on Identity’s role in 2024 from Okta Ventures portfolio leaders](https://www.okta.com/blog/industry-insights/predictions-on-identitys-role-in-2024-from-okta-ventures-portfolio-leaders) - [What is machine learning?](https://www.okta.com/blog/industry-insights/what-is-machine-learning) - [Website personalization: Personalizing experiences without third-party cookies](https://www.okta.com/blog/industry-insights/website-personalization-personalizing-experiences-without-third-party-cookies) - [Why Identity is the I in… Human-centered design](https://www.okta.com/blog/industry-insights/why-identity-is-the-i-in-human-centered-design) - [New ways to implement least privilege with Okta Workforce Identity](https://www.okta.com/blog/industry-insights/new-ways-to-implement-least-privilege-with-okta-workforce-identity) - [What Is a Data Breach?](https://www.okta.com/blog/industry-insights/data-breach) - [The quest for Workforce Identity maturity](https://www.okta.com/blog/industry-insights/the-quest-for-workforce-identity-maturity) - [Why Identity is the I in… Time Tax](https://www.okta.com/blog/industry-insights/why-identity-is-the-i-in-time-tax) - [What Is Infrastructure as a Service (IaaS)?](https://www.okta.com/blog/industry-insights/what-is-infrastructure-as-a-service-iaas) - [What Are the Benefits and Limitations of Multi-Cloud?](https://www.okta.com/blog/industry-insights/what-are-the-benefits-and-limitations-of-multi-cloud) - [Why healthcare organizations should invest in Identity now more than ever](https://www.okta.com/blog/industry-insights/why-healthcare-organizations-should-invest-in-identity-now-more-than-ever) - [What's top of mind for IT leaders in 2023](https://www.okta.com/blog/industry-insights/whats-top-of-mind-for-it-leaders-in-2023) - [Okta named a Leader in Forrester Wave™: Workforce Identity Platforms, Q1 2024](https://www.okta.com/blog/industry-insights/okta-named-a-leader-in-forrester-wavetm-workforce-identity-platforms-q1-2024) - [Open banking regulation in North America: A guide](https://www.okta.com/blog/industry-insights/open-banking-regulation-in-north-america-a-guide) - [Restoring Confidence in Financial Services with Identity](https://www.okta.com/blog/industry-insights/restoring-confidence-in-financial-services-with-identity) - [KuppingerCole ranks Okta as an Overall Leader in CIAM platforms](https://www.okta.com/blog/industry-insights/kuppingercole-ranks-okta-as-an-overall-leader-in-ciam-platforms) - [Okta applauds new cybersecurity executive order](https://www.okta.com/blog/industry-insights/okta-applauds-new-cybersecurity-executive-order) - [Okta named a Leader in Gartner® Access Management Magic Quadrant™ for the 7th consecutive year](https://www.okta.com/blog/industry-insights/okta-named-leader-in-gartner-access-management-magic-quadrant-for-7th-year) - [Okta named a Leader in Gartner® Magic Quadrant™ for Access Management for the 8th year in a row](https://www.okta.com/blog/industry-insights/okta-named-a-leader-in-gartner-magic-quadrant-for-access-management-for-8th-year) - [7 Key Data Privacy Laws for 2023](https://www.okta.com/blog/industry-insights/privacy-laws) - [Okta connectors in action: The Active Cyber Trust Portal](https://www.okta.com/blog/customers-and-partners/okta-connectors-in-action-the-active-cyber-trust-portal) - [Okta for US Military: A New milestone in DoD IL4 Identity](https://www.okta.com/blog/customers-and-partners/okta-for-us-military-a-new-milestone-in-dod-il4-identity) - [Okta and Google Chrome Enterprise: Innovating to secure the enterprise browser](https://www.okta.com/blog/customers-and-partners/okta-and-google-chrome-enterprise-innovating-to-secure-the-enterprise-browser) - [Okta Identity Management: The Secret to Self-Service IT at Workday](https://www.okta.com/blog/customers-and-partners/okta-identity-management-the-secret-to-self-service-it-at-workday) - [Okta for Global 2000: Agile Identity for the world's largest public companies](https://www.okta.com/blog/customers-and-partners/okta-for-global-2000-agile-identity-for-the-worlds-largest-public-companies) - [Reducing costs with Okta Workflows: The Wyndham Hotels and Resorts experience](https://www.okta.com/blog/customers-and-partners/reducing-costs-with-okta-workflows-the-wyndham-hotels-and-resorts-experience) - [Yubico FIDO Pre-reg with Okta makes passwordless onboarding easy](https://www.okta.com/blog/customers-and-partners/yubico-and-okta-easy-passwordless-onboarding-with-fido-pre-reg) - [Jamf and Okta: Identity management that innovates with Apple](https://www.okta.com/blog/customers-and-partners/jamf-and-okta-identity-management-that-innovates-with-apple) - [Meet the Experts: Elevating efficiency and security with multi-tenancy](https://www.okta.com/blog/customers-and-partners/meet-the-experts-elevating-efficiency-and-security-with-multi-tenancy) - [How Identity empowers prosperity for micro-retailers](https://www.okta.com/blog/customers-and-partners/identity-empowers-prosperity-for-micro-retailers) - [Using Login.gov as a Custom Identity Verification and Authentication Service in Okta](https://www.okta.com/blog/customers-and-partners/using-login-gov-as-a-custom-identity-verification-and-authentication-service-in-okta) - [Wealthsimple cuts app access wait time from 48-plus hours to one hour with Okta](https://www.okta.com/blog/customers-and-partners/wealthsimple-cuts-app-access-wait-time-from-48-plus-hours-to-one-hour-with-okta) - [Okta Partner Awards: Celebrating our 2024 Partner Award winners](https://www.okta.com/blog/customers-and-partners/okta-partner-awards-celebrating-our-2024-partner-award-winners) - [Okta and AWS Partner to Simplify Access Via Session Tags](https://www.okta.com/blog/customers-and-partners/okta-and-aws-partner-to-simplify-access-via-session-tags) - [Okta and Zylo Bring SaaS Management Integration](https://www.okta.com/blog/customers-and-partners/okta-and-zylo-bring-saas-management-integration) - [NTT DATA accelerates onboarding and simplifies M&A with Okta Workflows](https://www.okta.com/blog/customers-and-partners/ntt-data-accelerates-onboarding-and-simplifies-ma-with-okta-workflows) - [Okta wins AWS Global Marketplace Partner of the Year](https://www.okta.com/blog/customers-and-partners/okta-wins-aws-global-marketplace-partner-of-the-year) - [Zero Trust Secures Nonprofits’ Links to Clients, Staff, and Volunteers](https://www.okta.com/blog/customers-and-partners/zero-trust-secures-nonprofits-links-to-clients-staff-and-volunteers) - [Okta and Hiring Our Heroes: Empowering veterans through the Department of Defense’s SkillBridge](https://www.okta.com/blog/customers-and-partners/okta-and-hiring-our-heroes-empowering-veterans-through-the-department-of-defenses) - [Okta awarded the Palo Alto Networks 2023 Global Technology Partner Innovator of the Year](https://www.okta.com/blog/customers-and-partners/okta-awarded-the-palo-alto-networks-2023-global-technology-partner-innovator-of-the) - [Okta and Google Workspace are Improving Enterprise Security](https://www.okta.com/blog/customers-and-partners/okta-and-google-workspace-are-improving-enterprise-security) - [Kickstart Amazon Bedrock with Auth0 by Okta](https://www.okta.com/blog/customers-and-partners/kickstart-amazon-bedrock-with-auth0-by-okta) - [How Identity Serves the Total Army Zero Trust Strategy](https://www.okta.com/blog/customers-and-partners/how-identity-serves-the-total-army-zero-trust-strategy) - [Secure User Identities in Your Zoom Calls — Authenticated by Okta](https://www.okta.com/blog/customers-and-partners/secure-user-identities-in-your-zoom-calls-authenticated-by-okta) - [Streamlining workflows to create clinician efficiency with Identity](https://www.okta.com/blog/customers-and-partners/streamlining-workflows-to-create-clinician-efficiency-with-identity) - [Okta Partner Awards: Celebrating our global 2023 winners](https://www.okta.com/blog/customers-and-partners/okta-partner-awards-celebrating-our-global-2023-winners) - [Okta connectors in action: iC Consult’s Oracle EBS connector](https://www.okta.com/blog/customers-and-partners/okta-connectors-in-action-ic-consults-oracle-ebs-connector) - [Okta integrates with Singapore’s national digital ID system](https://www.okta.com/blog/customers-and-partners/okta-integrates-with-singapores-national-digital-id-system) - [Schuberg Philis saves 6,000+ hours of engineering time by automating with Okta Workflows](https://www.okta.com/blog/customers-and-partners/schuberg-philis-saves-6000-hours-of-engineering-time-by-automating-with-okta-workflows) - [Airtable sustainably scales automation with low-code Okta Workflows](https://www.okta.com/blog/customers-and-partners/airtable-sustainably-scales-automation-with-low-code-okta-workflows) - [Implementation services: The key to nonprofit digital transformation](https://www.okta.com/blog/customers-and-partners/implementation-services-the-key-to-nonprofit-digital-transformation) - [How Mars Leveraged Identity to Protect Sensitive Content and Applications](https://www.okta.com/blog/customers-and-partners/how-mars-leveraged-identity-to-protect-sensitive-content-and-applications) - [How nonprofits achieve their missions while delivering secure digital experiences](https://www.okta.com/blog/customers-and-partners/how-nonprofits-achieve-their-missions-while-delivering-secure-digital-experiences) - [Top Organizations Are Automating Identity With Okta Workflows](https://www.okta.com/blog/customers-and-partners/top-organizations-are-automating-identity-with-okta-workflows) - [How The Trevor Project saves 5,500 hours and $300K each year with Okta Workflows](https://www.okta.com/blog/customers-and-partners/how-the-trevor-project-saves-5500-hours-and-300k-each-year-with-okta-workflows) - [Unlock government efficiency at the Okta Gov Identity Summit 2025](https://www.okta.com/blog/customers-and-partners/unlock-government-efficiency-at-the-okta-gov-identity-summit-2025) - [Measuring the business value of Identity at Guaranteed Rate and ADT](https://www.okta.com/blog/customers-and-partners/measuring-the-business-value-of-identity-at-guaranteed-rate-and-adt) - [Tactical Identity Bridge Appliance: How the U.S. Government can extend Okta to the tactical edge](https://www.okta.com/blog/customers-and-partners/how-the-u-s-government-can-extend-okta-to-the-tactical-edge) - [Smart money: transforming financial services with Okta and AWS](https://www.okta.com/blog/customers-and-partners/smart-money-transforming-financial-services-with-okta-and-aws) - [Managed Identity solutions providers and BeyondID’s 3 value pillars ](https://www.okta.com/blog/customers-and-partners/managed-identity-solutions-providers-and-beyondids-3-value-pillars) - [How athenahealth Created a Secure, Scalable Healthcare Ecosystem](https://www.okta.com/blog/customers-and-partners/how-athenahealth-created-a-secure-scalable-healthcare-ecosystem) - [New Okta and Yubico integration delivers phishing-resistant authentication at enterprise scale](https://www.okta.com/blog/customers-and-partners/new-okta-and-yubico-integration-delivers-phishing-resistant-authentication-at) - [The fed gov needs Workforce Identity — three reasons why](https://www.okta.com/blog/customers-and-partners/the-fed-gov-needs-workforce-identity-three-reasons-why) - [Identity for impact: Follow three nonprofits on their journeys with Okta’s Innovation Lab](https://www.okta.com/blog/customers-and-partners/identity-for-impact-follow-three-nonprofits-on-their-journeys-with-oktas-innovation) - [Okta Wins Google Cloud Technology Partner of the Year Award for Productivity and Collaboration: Impact](https://www.okta.com/blog/customers-and-partners/okta-wins-google-cloud-technology-partner-of-the-year-award-for-productivity-and) - [Okta joins Google Cloud and industry leaders to build an open, secure AI ecosystem with MCP](https://www.okta.com/blog/ai/securing-the-ai-agent-ecosystem) - [Securely step into the AI era with AWS and Okta](https://www.okta.com/blog/ai/securely-step-into-the-ai-era-with-aws-and-okta) - [Identity Threat Protection with Okta AI is transforming security](https://www.okta.com/blog/ai/identity-threat-protection-with-okta-ai-is-transforming-security) - [Introducing Log Investigator: Transform your security operations with AI-powered log analysis](https://www.okta.com/blog/ai/introducing-log-investigator-transform-your-security-operations-with-ai-powered-log) - [Okta unveils responsible AI principles](https://www.okta.com/blog/ai/okta-unveils-responsible-ai-principles) - [Identity Threat Protection with Okta AI is Generally Available](https://www.okta.com/blog/ai/identity-threat-protection-with-okta-ai-is-generally-available) - [Transforming enterprise operations with Okta Workflows and OpenAI](https://www.okta.com/blog/ai/transforming-enterprise-operations-with-okta-workflows-and-openai) - [AI at Work 2024: A view from the C-suite](https://www.okta.com/blog/ai/ai-at-work-2024-a-view-from-the-c-suite) - [How AI impacts the SMB threat landscape](https://www.okta.com/blog/ai/how-ai-impacts-the-smb-threat-landscape) - [What is AI?](https://www.okta.com/blog/ai/what-is-ai) - [Identity Threat Protection with Okta AI](https://www.okta.com/blog/ai/identity-threat-protection-with-okta-ai) - [Oktane 2023: Go beyond with AI and Identity](https://www.okta.com/blog/ai/oktane-2023-go-beyond-with-ai-and-identity) - [Artificial Intelligence for public good](https://www.okta.com/blog/ai/artificial-intelligence-for-public-good) - [Unlocking the power of generative AI with Identity](https://www.okta.com/blog/ai/unlocking-the-power-of-generative-ai-with-identity) - [Responsible AI innovation at Okta](https://www.okta.com/blog/ai/responsible-ai-innovation-at-okta) - [What the GenAI paradigm shift means for Identity](https://www.okta.com/blog/ai/what-the-genai-paradigm-shift-means-for-identity) - [Use AI to Describe What an Okta Workflows Identity Automation Does](https://www.okta.com/blog/ai/ai-describe-workflows-automation) - [AI Is Changing Security—Here’s How](https://www.okta.com/blog/ai/ai-is-changing-security-heres-how) - [Okta helps secure AI agent identity](https://www.okta.com/blog/ai/okta-helps-secure-ai-agent-identity) - [Secure non-human identities with Okta’s unified platform](https://www.okta.com/blog/ai/secure-non-human-identities-with-oktas-unified-platform) - [How Okta Ventures supports startups with integrations to drive enterprise readiness](https://www.okta.com/blog/customers-and-partners/how-okta-ventures-supports-startups-with-integrations-to-drive-enterprise-readiness) - [Simplify identity management in higher education with Okta and AWS](https://www.okta.com/blog/customers-and-partners/simplify-identity-management-in-higher-education-with-okta-and-aws) - [Identity Insider: Zareen Erskine, FinMkt](https://www.okta.com/blog/customers-and-partners/identity-insider-zareen-erskine-finmkt) - [Announcing the 2025 Identity 25: Highlighting a community of digital Identity trailblazers](https://www.okta.com/blog/customers-and-partners/announcing-the-2025-identity-25-highlighting-a-community-of-digital-identity) - [How Okta and Palo Alto Networks forge an identity-powered security defense system](https://www.okta.com/blog/customers-and-partners/how-okta-and-palo-alto-networks-forge-an-identity-powered-security) - [IT leader translates Okta Workflows into business value](https://www.okta.com/blog/customers-and-partners/it-leader-translates-okta-workflows-into-business-value) - [Identity 25 U.S. Public Sector honorees: Part 1, MVPs of digital services and fraud defenses](https://www.okta.com/blog/customers-and-partners/identity-25-u-s-public-sector-honorees-part-1-mvps-of-digital-services-and-fraud) - [Leveling up: Achieving Okta professional certification](https://www.okta.com/blog/customers-and-partners/leveling-up-achieving-okta-professional-certification) - [Bridging the gap in browser security with Google and Okta](https://www.okta.com/blog/customers-and-partners/bridging-the-gap-in-browser-security-with-google-and-okta) - [Okta Ventures Request for Builders: Five key focus areas in Identity and security](https://www.okta.com/blog/customers-and-partners/okta-ventures-request-for-builders-five-key-focus-areas-in-identity-and-security) - [How Okta helps New York financial service companies comply with new MFA requirements](https://www.okta.com/blog/customers-and-partners/how-okta-helps-new-york-financial-service-companies-comply-with-new-mfa-requirements) - [Identity 25 U.S. Public Sector honorees: Part 2, Bridging academic innovation and government implementation](https://www.okta.com/blog/customers-and-partners/identity-25-u-s-public-sector-honorees-part-2-bridging-academic-innovation-and) - [Why the future of security depends on verifiable identity](https://www.okta.com/blog/identity-security/why-the-future-of-security-depends-on-verifiable-identity) - [5 tips to help secure OAuth and OpenID Connect tokens](https://www.okta.com/blog/product-innovation/5-tips-to-help-secure-oauth-and-openid-connect-tokens) - [Identity is the target](https://www.okta.com/blog/product-innovation/identity-is-the-target) - [Okta’s modern IGA solution, now part of the identity security fabric for government](https://www.okta.com/blog/product-innovation/okta-iga-for-federal-identity-security-fabric) - [Okta welcomes US DoD and mission partners to Okta Identity Governance, Workflows, and AI](https://www.okta.com/blog/product-innovation/okta-welcomes-dod-and-mission-partners-to-iga-workflows-ai) - [Elevating Okta Workflows observability: Execution Log Streaming and Execution History Inspector now Generally Available](https://www.okta.com/blog/product-innovation/elevating-okta-workflows-observability--execution-log-streaming) - [The business value of verifiable digital credentials: 3 practical use cases](https://www.okta.com/blog/identity-security/the-business-value-of-verifiable-digital-credentials) - [Unified Requester Experience: Your one-stop shop for Access Requests](https://www.okta.com/blog/product-innovation/unified-requester-experience-your-one-stop-shop-for-access-requests) - [Request for builders: Six key focus areas in Identity ](https://www.okta.com/blog/industry-insights/request-for-builders-six-key-focus-areas-in-identity) - [Okta Partners with DigitalOcean, Netlify, and Vercel to Simplify Identity for Developers](https://www.okta.com/blog/customers-and-partners/okta-partners-to-simplify-identity) - [Your security tools aren't talking. Attackers love that.](https://www.okta.com/blog/identity-security/identity-security-fabric-for-the-modern-threat-landscape) - [Passkeys: The key to a passwordless future](https://www.okta.com/blog/identity-security/passkeys--the-key-to-a-passwordless-future) - [A technical overview of the verifiable digital credentials ecosystem](https://www.okta.com/blog/identity-security/technical-overview-of-verifiable-digital-credentials-ecosystem) - [Beyond ID’s top identity threats in 2025](https://www.okta.com/blog/customers-and-partners/beyond-id-s-top-identity-threats-in-2025) - [Verifiable digital credentials explained: How they work and why they matter](https://www.okta.com/blog/identity-security/verifiable-digital-credentials-explained) - [Securing serverless AI agents and MCP servers on AWS with Okta](https://www.okta.com/blog/ai/securing-serverless-ai-agents-and-mcp-servers-on-aws-with-okta) - [Bridging past and future: How identity enables EDUCAUSE's vision of restored trust](https://www.okta.com/blog/customers-and-partners/bridging-past-and-future--how-identity-enables-educauses-vision) - [Identity security 101: How to drive trust and loyalty across the user journey](https://www.okta.com/blog/identity-security/identity-security-101-how-to-drive-trust-and-loyalty-across-the-user-journey) - [Back to school: Navigating the rising Identity security challenges in higher education](https://www.okta.com/blog/industry-insights/back-to-school-navigating-the-rising-identity-security-challenges-in-higher-education) - [Okta’s mission to standardize Identity Security](https://www.okta.com/blog/identity-security/oktas-mission-to-standardize-identity-security) - [Building AI-ready identity security with Okta Identity Security Posture Management](https://www.okta.com/blog/ai/building-ai-ready-identity-security-with-okta-identity-security-posture-management) - [How Okta mitigates OWASP’s Top 10 Non-Human Identity Risks](https://www.okta.com/blog/ai/how-okta-mitigates-owasps-top-10-non-human-identity-risks) - [Non-human and human identities: A unified approach](https://www.okta.com/blog/ai/non-human-and-human-identities-a-unified-approach) - [Partnership built on innovation and trust](https://www.okta.com/blog/customers-and-partners/partnership-built-on-innovation-and-trust) - [Navigating the future of security at Oktane](https://www.okta.com/blog/customers-and-partners/navigating-the-future-of-security-at-oktane) - [Generative and agentic AI: A security perspective with Okta](https://www.okta.com/blog/ai/generative-and-agentic-ai--a-security-perspective-with-okta) - [Launch Week ‘25: Oktane edition](https://www.okta.com/blog/product-innovation/launch-week-oktane-edition-september25) - [AI agents are everywhere. Is your business ready?](https://www.okta.com/blog/ai/preparing-for-ai-agents) - [The Salesloft incident: Why Identity Security Posture Management matters](https://www.okta.com/blog/industry-insights/salesloft-incident-and-identity-security-posture-management) - [Your guide to modern identity governance](https://www.okta.com/blog/industry-insights/your-guide-to-modern-identity-governance) - [Fast, policy-driven access requests without the manual headaches](https://www.okta.com/blog/industry-insights/fast--policy-driven-access-requests-without-the-manual-headaches) - [Scaling identity lifecycle with Okta Identity Governance](https://www.okta.com/blog/industry-insights/scaling-identity-lifecycle-with-okta-identity-governance) - [I didn’t plan on a career in sales – Here’s why I love it at Okta](https://www.okta.com/blog/company-and-culture/why-i-love-my-sales-career-at-okta) - [Provisioning made simple with Okta Identity Governance](https://www.okta.com/blog/industry-insights/provisioning-made-simple-with-okta-identity-governance) - [Modernizing access reviews with Okta](https://www.okta.com/blog/industry-insights/modernizing-access-reviews-with-okta) - [Our proactive security journey: Adopting Okta Identity Threat Protection](https://www.okta.com/blog/product-innovation/adopting-okta-identity-threat-protection) - [Merging identity with macOS onboarding](https://www.okta.com/blog/product-innovation/merging-identity-with-macos-onboarding) - [Expanding nonprofit access to Okta products](https://www.okta.com/blog/company-and-culture/expanding-nonprofit-access-to-okta-products) - [Breaking the glass ceiling: The power of tech talks for women in tech](https://www.okta.com/blog/company-and-culture/breaking-the-glass-ceiling-the-power-of-tech-talks-for-women-in-tech) - [Keys to high-quality service releases at Okta](https://www.okta.com/blog/company-and-culture/keys-to-high-quality-service-releases-at-okta) - [Empowering encounters: Celebrating women in engineering](https://www.okta.com/blog/company-and-culture/empowering-encounters-celebrating-women-in-engineering) - [Unlocking success: How mentorship empowers engineers](https://www.okta.com/blog/company-and-culture/unlocking-success-how-mentorship-empowers-engineers) - [QA chronicles: Safeguarding the quality of Generally Available features](https://www.okta.com/blog/company-and-culture/qa-chronicles-safeguarding-the-quality-of-generally-available-features) - [Evolving Okta’s edge infrastructure](https://www.okta.com/blog/company-and-culture/evolving-oktas-edge-infrastructure) - [A Brief Overview of Testing at Okta](https://www.okta.com/blog/company-and-culture/a-brief-overview-of-testing-at-okta) - [WebAuthn: Growth and challenges](https://www.okta.com/blog/identity-security/webauthn-growth-and-challenges) - [Phishing resistance in unmanaged iOS devices](https://www.okta.com/blog/identity-security/phishing-resistance-in-unmanaged-ios-devices) - [Phishing-resistant MFA shows great momentum](https://www.okta.com/blog/identity-security/phishing-resistant-mfa-shows-great-momentum) - [Automated defense against Identity-based attacks](https://www.okta.com/blog/identity-security/automated-defense-against-identity-based-attacks) - [Unifying efforts, amplifying security: Shared Signals interoperability](https://www.okta.com/blog/identity-security/unifying-efforts-amplifying-security-shared-signals-interoperability) - [Navigating credential and fraud risks: The phishing resistance authenticator effect](https://www.okta.com/blog/identity-security/navigating-credential-and-fraud-risks-the-phishing-resistance-authenticator-effect) - [Buy v. Build: Advice from a CTO](https://www.okta.com/blog/industry-insights/buy-v-build-advice-from-a-cto) - [Highly efficient data ingestion with the Snowpipe Streaming API](https://www.okta.com/blog/product-innovation/highly-efficient-data-ingestion-with-the-snowpipe-streaming-api) - [Okta and Google Chrome Enterprise: Enhanced application protections with device assurance](https://www.okta.com/blog/product-innovation/okta-and-google-chrome-enterprise-enhanced-application-protections-with-device) - [Improving the end-user registration experience with Okta Identity Engine](https://www.okta.com/blog/product-innovation/improving-the-end-user-registration-experience-with-okta-identity-engine) - [Bootstrapping Okta FastPass enrollment in a phishing-resistant manner](https://www.okta.com/blog/product-innovation/bootstrapping-okta-fastpass-enrollment-in-a-phishing-resistant-manner) - [Why we sunset the Okta Verify watch app](https://www.okta.com/blog/product-innovation/why-we-sunset-the-okta-verify-watch-app) - [A Deep Dive Into Okta FastPass](https://www.okta.com/blog/product-innovation/a-deep-dive-into-okta-fastpass) - [Why Okta Verify protects your identity by pinning TLS connections](https://www.okta.com/blog/product-innovation/why-okta-verify-protects-your-identity-by-pinning-tls-connections) - [Context re-evaluation with FastPass](https://www.okta.com/blog/product-innovation/context-re-evaluation-with-fastpass) - [Migrating off legacy Tokio at scale](https://www.okta.com/blog/product-innovation/migrating-off-legacy-tokio-at-scale) - [Desktop password sync: Unlock the benefits of platform SSO for macOS](https://www.okta.com/blog/product-innovation/desktop-password-sync-unlock-the-benefits-of-platform-sso-for-macos) - [How Okta uses machine learning to automatically detect and mitigate toll fraud](https://www.okta.com/blog/product-innovation/how-okta-uses-machine-learning-to-automatically-detect-and-mitigate-toll-fraud) - [Achieve Enhanced Secure Authentication with Okta FastPass and CrowdStrike](https://www.okta.com/blog/product-innovation/achieve-enhanced-secure-authentication-with-okta-fastpass-and-crowdstrike) - [Behind the scenes at Access Requests: Worker tasks](https://www.okta.com/blog/product-innovation/behind-the-scenes-at-access-requests-worker-tasks) - [Implementing security best practices in Okta developer orgs](https://www.okta.com/blog/product-innovation/implementing-security-best-practices-in-okta-developer-orgs) - [AutoGuardian: How Okta solved flaky tests](https://www.okta.com/blog/product-innovation/autoguardian-how-okta-solved-flaky-tests) - [Announcing Okta Identity Governance for Customer Identity](https://www.okta.com/blog/product-innovation/announcing-okta-identity-governance-for-customer-identity) - [Restoring the promise: How identity transforms EDUCAUSE's vision into reality](https://www.okta.com/blog/company-and-culture/restoring-the-promise-how-identity-transforms-educauses-vision) - [Simplifying the Complexities of B2B Collaboration](https://www.okta.com/blog/product-innovation/simplifying-the-complexities-of-b2b-collaboration) - [End-to-end visibility for governance and compliance](https://www.okta.com/blog/industry-insights/end-to-end-visibility-for-governance-and-compliance) - [Simplifying Role-Based Access Control at scale](https://www.okta.com/blog/industry-insights/simplifying-role-based-access-control-at-scale) - [What I didn’t expect to learn at Okta (but needed most)](https://www.okta.com/blog/company-and-culture/what-i-didnt-expect-to-learn-at-okta-but-needed-most) - [Designing a resilient identity security fabric with Okta](https://www.okta.com/blog/identity-security/designing-a-resilient-identity-security-fabric-with-okta) - [Automating partner access with Okta Workflows and Realms](https://www.okta.com/blog/industry-insights/automating-partner-access-with-okta-workflows-and-realms) - [Interning with Okta’s Productivity Engineering team](https://www.okta.com/blog/company-and-culture/interning-with-okta-s-productivity-engineering-team) - [Identity Threat Protection Detections now available for Adaptive MFA Super Admins](https://www.okta.com/blog/product-innovation/identity-threat-protection-detections-now-available-for-adaptive) - [Why entitlement management needs a modern take](https://www.okta.com/blog/industry-insights/why-entitlement-management-needs-a-modern-take) ## Newsroom - [Newsroom](https://www.okta.com/newsroom) — The Okta Newsroom keeps you informed about the biggest developments in identity and security, from company news to industry insights and product innovation. ## Newsroom Post - [Okta Ventures unveils the Identity 25 to honor pioneers shaping the future of digital identity](https://www.okta.com/newsroom/press-releases/okta-ventures-unveils-the-identity-25-to-honor-pioneers-shaping-the) - [NetHope and Okta: Securing digital protection and cybersecurity for nonprofits worldwide](https://www.okta.com/newsroom/press-releases/nethope-and-okta-securing-digital-protection-and-cybersecurity-for) - [Savex teams with Okta to accelerate adoption of digital identity in India](https://www.okta.com/newsroom/press-releases/savex-teams-with-okta-to-accelerate-adoption-of-digital-identity-in-india) - [Okta named a Leader in 2024 Gartner® Magic Quadrant™ for Access Management for eighth consecutive year](https://www.okta.com/newsroom/press-releases/okta-named-a-leader-in-2024-gartner-magic-quadrant) - [Okta, OpenID Foundation, and tech firms tackle today’s biggest cybersecurity challenge: Identity security in SaaS apps](https://www.okta.com/newsroom/press-releases/okta-openid-foundation-tech-firms-tackle-todays-biggest-cybersecurity) - [Okta for Good launches new grant portfolio to improve cybersecurity for nonprofits](https://www.okta.com/newsroom/press-releases/okta-for-good-launches-new-grant-portfolio-to-improve-cybersecurity-for) - [Auth0 takes “free for developers” to a new level with more users, more security, free MFA and passwordless](https://www.okta.com/newsroom/press-releases/auth0-takes-free-for-developers-to-a-new-level-with-more-users-more) - [Okta introduces Okta Device Access to help organizations mature their Zero Trust strategy](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-device-access-to-help-organizations-mature-their) - [Okta appoints Eric Kelleher as President and Chief Operating Officer](https://www.okta.com/newsroom/press-releases/okta-appoints-eric-kelleher-as-president-and-chief-operating-officer) - [Okta strengthens go-to-market leadership with executive appointments](https://www.okta.com/newsroom/press-releases/okta-strengthens-go-to-market-leadership-with-executive-appointments) - [Okta, CrowdStrike, Netskope, and Proofpoint join together to secure remote work](https://www.okta.com/newsroom/press-releases/okta-crowdstrike-netskope-and-proofpoint-join-together-to-secure-remote-work) - [Okta unveils updated availability for Okta Workflows as new standalone offering with expanded capabilities](https://www.okta.com/newsroom/press-releases/okta-unveils-updated-availability-for-okta-workflows-as-new-standalone) - [Okta launches passkey support to help enterprises unlock a passwordless future](https://www.okta.com/newsroom/press-releases/okta-launches-passkey-support-to-help-enterprises-unlock-a-passwordless) - [Okta for Government High achieves FedRAMP High authorization](https://www.okta.com/newsroom/press-releases/okta-for-government-high-achieves-fedramp-high-authorization) - [Use of multi-factor authentication (MFA) nearly doubles since 2020, new Okta Secure Sign-In Trends Report finds](https://www.okta.com/newsroom/press-releases/use-of-multi-factor-authentication-mfa-nearly-doubles-since-2020-new-okta) - [Okta sponsors firstboard.io to support talent diversification at the highest levels](https://www.okta.com/newsroom/press-releases/okta-sponsors-firstboard-io-to-support-talent-diversification) - [Okta introduces innovations to help companies harden their security posture and protect sensitive transactions](https://www.okta.com/newsroom/press-releases/okta-introduces-innovations-to-help-companies-harden-their-security) - [Okta named a Leader in 2023 Gartner® Magic Quadrant™ for Access Management for 7th consecutive year](https://www.okta.com/newsroom/press-releases/okta-named-a-leader-in-2023-gartnerr-magic-quadranttm-for-access) - [Okta announces availability of fine-grained authorization for enhanced security and efficiency](https://www.okta.com/newsroom/press-releases/okta-announces-availability-of-fine-grained-authorization-for-enhanced) - [Security Tinkerers hosts “Pitch for Charity” event cosponsored by Okta and SentinelOne at Okta headquarters in San Francisco](https://www.okta.com/newsroom/press-releases/pitch-for-charity) - [Okta is reducing the risk of unmanaged identities, social engineering, and MFA overload for enterprise employees](https://www.okta.com/newsroom/press-releases/okta-is-reducing-the-risk-of-unmanaged-identities-social-engineering) - [Introducing Okta for Global 2000: Identity Solution to Give CEOs and Board of Directors Flexibility to Centralize or Decentralize their Business Strategy](https://www.okta.com/newsroom/press-releases/introducing-okta-for-global-2000-identity-solution-to-give-ceos-and-board) - [Okta named a Leader in 2022 Gartner® Magic Quadrant™ for Access Management for 6th consecutive year](https://www.okta.com/newsroom/press-releases/okta-named-a-leader-in-2022-gartner-magic-quadrant-for-access) - [Okta launches Identity Threat Protection with Okta AI for real-time detection and response](https://www.okta.com/newsroom/press-releases/okta-launches-identity-threat-protection-with-okta-ai-for-real-time) - [Okta puts partners at the heart of its growth strategy](https://www.okta.com/newsroom/press-releases/okta-puts-partners-at-the-heart-of-its-growth-strategy) - [Plaid and Okta partner to deliver secure and seamless access for open finance](https://www.okta.com/newsroom/press-releases/plaid-and-okta-partner-to-deliver-secure-and-seamless-access) - [Okta names Emilie Choi to board of directors](https://www.okta.com/newsroom/press-releases/okta-names-emilie-choi-to-board-of-directors) - [Okta unveils new Okta Workforce Identity Cloud innovations to power enterprise security, productivity, and agility](https://www.okta.com/newsroom/press-releases/okta-unveils-new-okta-workforce-identity-cloud-innovations-to-power) - [Okta names Tony bates to board of directors](https://www.okta.com/newsroom/press-releases/okta-names-tony-bates-to-board-of-directors) - [Accredify secures new strategic investment from Okta Ventures to accelerate digital trust](https://www.okta.com/newsroom/press-releases/accredify-secures-new-strategic-investment-from-okta-ventures-to) - [Okta announces multi-year partnership with the Mclaren Racing Formula 1 team](https://www.okta.com/newsroom/press-releases/okta-announces-multi-year-partnership-with-the-mclaren-racing-formula-1-team) - [A digital disconnect? Irish citizens say yes to online banking and public services, but need more education on the benefits of digital IDs](https://www.okta.com/newsroom/press-releases/a-digital-disconnect-irish-citizens-say-yes-to-online-banking-and-public) - [Okta announces SaaS startup competition to build new Identity Security applications](https://www.okta.com/newsroom/press-releases/okta-announces-saas-startup-competition-to-build-new-identity-security) - [Okta introduces Okta Customer Identity Cloud to help businesses grow user bases without compromising security](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-customer-identity-cloud-to-help-businesses-grow-user) - [Zscaler and Okta enhance enterprise cybersecurity with new Zero Trust integrations](https://www.okta.com/newsroom/press-releases/zscaler-and-okta-enhance-enterprise-cybersecurity-with-new-zero-trust) - [Okta helps builders easily implement auth for GenAI apps a secure how consumers interact with GenAI agents](https://www.okta.com/newsroom/press-releases/okta-helps-builders-easily-implement-auth-for-genai-apps-secure-how) - [Two-thirds of U.S. SMBs name financial loss and trust damage as top cyberattack concerns](https://www.okta.com/newsroom/press-releases/north-american-smb-face-significant-cyberattack-challenges) - [Okta Announces Finalists for SaaS Startup Competition to Build Identity Security Applications](https://www.okta.com/newsroom/press-releases/okta-announces-finalists-for-saas-startup-competition-to-build-identity) - [Okta introduces Okta for US Military, a purpose-built Identity environment for the U.S. Department of Defense](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-for-us-military-a-purpose-built-identity-environment) - [Okta introduces Okta AI – securely connecting people to technology in the AI era](https://www.okta.com/newsroom/press-releases/okta-introduces-okta-ai-securely-connecting-people-to-technology-ai-era) - [Okta announces kickoff of Identity 25 nominations](https://www.okta.com/newsroom/press-releases/okta-announces-kickoff-of-identity-25-nominations) - [Okta recognized in the 2022 Gartner Peer Insights™ ‘Voice of the Customer’: Access Management](https://www.okta.com/newsroom/press-releases/okta-recognized-in-the-2022-gartner-peer-insightstm-voice-of-the-customer) - [Okta launches cybersecurity workforce development initiative to help close the tech and cybersecurity skills gap](https://www.okta.com/newsroom/press-releases/okta-launches-cybersecurity-workforce-development-initiative-to-help) - [Okta announces appointment of Shibu Ninan as new Chief Accounting Officer](https://www.okta.com/newsroom/press-releases/okta-announces-appointment-of-shibu-ninan-as-new-chief-accounting-officer) - [Okta appoints Jon Addison as Chief Revenue Officer and Kerry Ok as Chief Marketing Officer](https://www.okta.com/newsroom/press-releases/okta-appoints-jon-addison-as-chief-revenue-officer-and-kerry-ok-as-chief) - [Okta passes $1 billion in sales in AWS Marketplace](https://www.okta.com/newsroom/press-releases/okta-passes-1-billion-in-sales-in-aws-marketplace) - [Businesses at Work 2021: Driving the digital economy forward](https://www.okta.com/newsroom/articles/businesses-at-work-2021-driving-the-digital-economy-forward) - [Articles](https://www.okta.com/newsroom/articles) - [Businesses at Work 2022: Familiar players in a changing landscape](https://www.okta.com/newsroom/articles/businesses-at-work-2022-familiar-players-in-a-changing-landscape) - [Press Releases](https://www.okta.com/newsroom/press-releases) - [New Okta Platform innovations extend Identity Security Fabric to non-human identities in an agentic AI future](https://www.okta.com/newsroom/press-releases/okta-platform-innovation) - [New Auth0 Platform innovations help developers secure GenAI applications with Identity for AI agents](https://www.okta.com/newsroom/press-releases/auth0-platform-innovation) - [A blueprint for Identity Security in the era of AI and NHIs](https://www.okta.com/newsroom/articles/showcase-announcements) - [AI at Work 2024: A view from the C-suite](https://www.okta.com/newsroom/articles/ai-at-work-2024-a-view-from-the-c-suite) - [Introducing the Okta Secure Identity Commitment](https://www.okta.com/newsroom/press-releases/introducing-the-okta-secure-identity-commitment) - [The weakest link: Securing your extended workforce](https://www.okta.com/newsroom/articles/securing-your-extended-workforce) - [New report: What customers really want in online experiences](https://www.okta.com/newsroom/articles/customer-identity-trends-report) - [What a change of power in Washington means for cybersecurity](https://www.okta.com/newsroom/articles/what-a-change-of-power-in-washington-means-for-cybersecurity) - [People-centered Identity with John Heedley of Vialto Partners](https://www.okta.com/newsroom/articles/people-centered-identity-with-john-heedley-of-vialto-partners) - [Verifying the Identity of your remote workforce](https://www.okta.com/newsroom/articles/verifying-identity-remote-workforce) - [How Okta fosters a security culture](https://www.okta.com/newsroom/articles/how-okta-fosters-a-security-culture) - [Businesses at Work 2025: 10 years of data show how critical security has become](https://www.okta.com/newsroom/articles/businesses-at-work-2025) - [Key findings from our 2023 State of Secure Identity Report](https://www.okta.com/newsroom/articles/key-findings-from-our-2023-state-of-secure-identity-report) - [5 tips to enhance security without sacrificing productivity or user experience](https://www.okta.com/newsroom/articles/5-tips-to-enhance-security-without-sacrificing-productivity-or-user-experience) - [How cybercriminals are using gen AI to scale their scams](https://www.okta.com/newsroom/articles/how-cybercriminals-are-using-gen-ai-to-scale-their-scams) - [New report reveals trends in secure sign-in](https://www.okta.com/newsroom/articles/secure-sign-in-trends-report) - [CISOs’ top threats for 2025, from deepfakes to Scattered Spider](https://www.okta.com/newsroom/articles/cisos-top-threats-for-2025-from-deepfakes-to-scattered-spider) - [Businesses at Work 2023: Innovation and resilience in uncertain times](https://www.okta.com/newsroom/articles/businesses-at-work-2023) - [Businesses at Work 2024: Fundamentals in focus](https://www.okta.com/newsroom/articles/businesses-at-work-2024) - [Win over the board: CISO strategies for proving security’s ROI](https://www.okta.com/newsroom/articles/win-over-the-board-ciso-strategies-for-proving-securitys-roi) - [Five predictions for Identity-centric attacks in 2025](https://www.okta.com/newsroom/articles/five-predictions-for-identity-centric-attacks-in-2025) - [Okta Sees 500 Percent Customer Growth, Including London’s Gatwick Airport](https://www.okta.com/newsroom/press-releases/okta-sees-500-percent-customer-growth-including-londons-gatwick-airport) - [How to measure the success of your security program](https://www.okta.com/newsroom/articles/how-to-measure-the-success-of-your-security-program) - [Okta Threat Intelligence exposes GenAI's role in DPRK IT scams](https://www.okta.com/newsroom/articles/okta-threat-intelligence-exposes-genai-s-role-in-dprk-it-scams) - [The hidden threat in your stack: Why non-human identity management is the next cybersecurity frontier](https://www.okta.com/newsroom/articles/the-hidden-threat-in-your-stack--why-non-human-identity-manageme) - [From vulnerabilities to vendor trust: How CISOs build cyber resilience](https://www.okta.com/newsroom/articles/from-vulnerabilities-to-vendor-trust--how-cisos-build-cyber-resi) - [The next identity imperative: Securing AI agents](https://www.okta.com/newsroom/articles/the-next-identity-imperative--securing-ai-agents) - [Okta's Q1 FY26 earnings recap: In identity security, innovation drives growth](https://www.okta.com/newsroom/articles/oktas-q1-fy26-earnings-recap-in-identity-security-innovation-drives-growth) - [Auth0, Google Cloud partnership raises standards for agent-to-agent authentication](https://www.okta.com/newsroom/articles/auth0--google-cloud-partnership-raises-standards-for-agent-to-ag) - [5 important insights from our 2022 State of Zero Trust report](https://www.okta.com/newsroom/articles/state-of-zero-trust-report-2022-takeaways) - [Securing identity in the age of AI: Insights from Okta Platform’s Chief Product Officer](https://www.okta.com/newsroom/articles/securing-identity-in-the-age-of-ai--insights-from-okta-platform-) - [Okta introduces Cross App Access to help secure AI agents in the enterprise](https://www.okta.com/newsroom/press-releases/okta-introduces-cross-app-access-to-help-secure-ai-agents-in-the) - [The ‘superuser’ blind spot: Why AI agents demand dedicated identity security](https://www.okta.com/newsroom/articles/understanding-the-ai-agent-identity-challenge) - [Customer Identity Trends Report 2025: Securing customer trust in the age of AI](https://www.okta.com/newsroom/articles/customer-identity-trends-report-2025--securing-customer-trust-in) - [The new ‘front door’: A primer on digital identity and how to secure it](https://www.okta.com/newsroom/articles/the-new--front-door---a-primer-on-digital-identity-and-how-to-se) - [Okta observes v0 AI tool used to build phishing sites](https://www.okta.com/newsroom/articles/okta-observes-v0-ai-tool-used-to-build-phishing-sites) - [Navigating AI's impact on security with Guidewire CISO James Dolph](https://www.okta.com/newsroom/articles/navigating-ai-s-impact-on-security-with-guidewire-ciso-james-dol) - [The password problem: Why we need a passwordless world](https://www.okta.com/newsroom/articles/the-password-problem--why-we-need-a-passwordless-world) - [Okta and Palo Alto Networks unify AI-driven security to fight identity attacks](https://www.okta.com/newsroom/press-releases/okta-and-palo-alto-networks-unify-ai-driven-security-to-fight-id) - [Deepfakes and deception: Building a human firewall against AI-powered attacks](https://www.okta.com/newsroom/articles/deepfakes-and-deception--building-a-human-firewall-against-ai-po) - [Sophisticated deception: Thoughtworks CISO Nitin Raina on a new era of social engineering attacks](https://www.okta.com/newsroom/articles/sophisticated-deception--thoughtworks-ciso-nitin-raina-on-a-new-) - [Third-party risk: 3 actions security leaders should take to safeguard their business](https://www.okta.com/newsroom/articles/third-party-risk--3-actions-security-leaders-should-take-to-safe) - [New NIST guidelines share a path to Zero Trust Architecture](https://www.okta.com/newsroom/articles/new-nist-guidelines-share-a-path-to-zero-trust-architecture) - [PGA of America’s CTO/CIO Kevin Scott on AI agents, identity, and the future of golf](https://www.okta.com/newsroom/articles/pga-of-america-s-cto-cio-kevin-scott-on-ai-agents--identity--and) - [Todd’s Take: Securing identity in the age of AI](https://www.okta.com/newsroom/articles/todd-s-take--securing-identity-in-the-age-of-ai) - [Threat actors: “Please do not use Okta FastPass”](https://www.okta.com/newsroom/articles/threat-actors---please-do-not-use-okta-fastpass-) - [AI at Work 2025: Securing the AI-powered workforce](https://www.okta.com/newsroom/articles/ai-at-work-2025--securing-the-ai-powered-workforce) - [Securing agentic AI: Why we need enterprise-grade authorization now](https://www.okta.com/newsroom/articles/securing-agentic-ai--why-we-need-enterprise-grade-authorization-) - [Okta Identity Summit: Securing agentic AI](https://www.okta.com/newsroom/articles/okta-identity-summit--securing-agentic-ai) - [Okta names David Schellhase and Mary Agnes Wilderotter to board of directors](https://www.okta.com/newsroom/press-releases/okta-names-david-schellhase-and-mary-agnes-wilderotter-to-board-) - [The trust deficit: Why consumers are wary of AI agents (and what to do about it)](https://www.okta.com/newsroom/articles/the-trust-deficit--why-consumers-are-wary-of-ai-agents--and-what) - [Okta with Axiom Security: Delivering robust privileged access for modern infrastructure in the AI era](https://www.okta.com/newsroom/press-releases/okta-with-axiom-security--delivering-robust-privileged-access-fo) - [Okta announces second quarter fiscal year 2026 financial results](https://www.okta.com/newsroom/press-releases/okta-announces-second-quarter-fiscal-year-2026-financial-results) - [Okta named to inaugural StateRAMP authorized vendor list](https://www.okta.com/newsroom/press-releases/okta-named-to-inaugural-stateramp-authorized-vendor-list) - [Peraton and Okta partner with US Department of Defense in support of myAuth](https://www.okta.com/newsroom/press-releases/peraton-and-okta-partner-with-department-of-defense-in-support-o) - [Okta CEO highlights strong Q2 performance and AI-driven growth on CNBC](https://www.okta.com/newsroom/articles/okta-ceo-highlights-strong-q2-performance-and-ai-driven-growth-o) - [The Salesloft incident: A wake-up call for SaaS security and IPSIE adoption](https://www.okta.com/newsroom/articles/the-salesloft-incident--a-wake-up-call-for-saas-security-and-ips) - [Why attackers keep winning with consent phishing](https://www.okta.com/newsroom/articles/why-attackers-keep-winning-with-consent-phishing) - [New report: Identity security cuts potential cyber losses by billions](https://www.okta.com/newsroom/articles/new-report--identity-security-cuts-potential-cyber-losses-by-bil) - [Why your AI strategy is exposing you to risk — and what to do about it](https://www.okta.com/newsroom/articles/why-your-ai-strategy-is-exposing-you-to-risk---and-what-to-do-ab) - [Securing good: How strategic tech support is protecting nonprofit missions](https://www.okta.com/newsroom/articles/securing-good--how-strategic-tech-support-is-protecting-nonprofi) - [Preparing for the unknown: The future of data resilience with Druva CTO Stephen Manley](https://www.okta.com/newsroom/articles/preparing-for-the-unknown--the-future-of-data-resilience-with-dr) - [Security researchers uncover VoidProxy, an advanced MFA-bypassing phishing platform](https://www.okta.com/newsroom/articles/security-researchers-uncover-voidproxy--an-advanced-mfa-bypassin) - [How STARs can close the cybersecurity talent gap](https://www.okta.com/newsroom/articles/how-stars-can-close-the-cybersecurity-talent-gap) - [Addressing the growing threat of ransomware with Druva CTO Stephen Manley](https://www.okta.com/newsroom/articles/addressing-the-growing-threat-of-ransomware-with-druva-cto-steph) - [Okta announces finalists for startup challenge to build identity security applications](https://www.okta.com/newsroom/press-releases/okta-announces-finalists-for-startup-challenge-to-build-identity) - [Okta Partner Awards: Celebrating our 2025 Partner Award winners](https://www.okta.com/newsroom/press-releases/okta-partner-awards--celebrating-our-2025-partner-award-winners) - [Old security challenges, new AI risks: Managing authorization in a complex ecosystem](https://www.okta.com/newsroom/articles/old-security-challenges--new-ai-risks--managing-authorization-in) - [New Okta innovations secure the AI-driven enterprise and combat fraud with an identity security fabric](https://www.okta.com/newsroom/press-releases/new-okta-innovations-secure-the-ai-driven-enterprise-and-combat-) - [Box’s CISO on how AI agents can be a ‘force multiplier’ for security](https://www.okta.com/newsroom/articles/box-s-ciso-on-how-ai-agents-can-be-a--force-multiplier--for-secu) - [The s1ngularity attack: When attackers prompt your AI agents to do their bidding](https://www.okta.com/newsroom/articles/the-s1ngularity-attack--when-attackers-prompt-your-ai-agents-to-) - [Okta CSO David Bradbury on the AI race and the price of security shortcuts](https://www.okta.com/newsroom/articles/okta-cso-david-bradbury-on-the-ai-race-and-the-price-of-security) - [AI agents are joining the workforce, but who’s keeping them in check?](https://www.okta.com/newsroom/articles/ai-agents-are-joining-the-workforce--but-who-s-keeping-them-in-c) - [Okta Personal VP Vivek Raman on the power of verifiable digital credentials](https://www.okta.com/newsroom/articles/okta-personal-vp-vivek-raman-on-the-power-of-verifiable-digital-) - [Okta, Google Workspace, and Omnissa partner on best-of-breed security and AI-powered productivity](https://www.okta.com/newsroom/articles/okta--google-workspace--and-omnissa-collaborate-to-deliver-best-) - [Auth0 President Shiv Ramji on building secure apps in the age of AI](https://www.okta.com/newsroom/articles/auth0-president-shiv-ramji-on-building-secure-apps-in-the-age-of) - [North Korea’s IT Workers expand beyond US big tech](https://www.okta.com/newsroom/articles/north-korea-s-it-workers-expand-beyond-us-big-tech) - [Okta welcomes Ric Smith as the new President of Products and Technology](https://www.okta.com/newsroom/press-releases/okta-welcomes-ric-smith-as-the-new-president-of-products-and-tec) - [Auth0 President Shiven Ramji on why identity security is a non-negotiable for AI adoption](https://www.okta.com/newsroom/articles/auth0-president-shiven-ramji-on-why-identity-security-is-a-non-n) - [Welcoming our new Chief Marketing Officer, Shannon Duffy](https://www.okta.com/newsroom/articles/welcoming-our-new-chief-marketing-officer--shannon-duffy)