Four Benefits of Okta’s New Custom Admin Roles

Organisations across every industry are facilitating an exponential rise in new app creation and usage. This increase is making centralised access management increasingly costly and complex. Okta has always featured specific admin roles to meet these needs, spanning from “mobile admin” and “report admin” roles, to the global “Okta super admin”…

Why 3 Companies Moved Away from Active Directory

With ever-growing networks of employees, contractors, and partners working remotely across devices, organisations are trading Microsoft Active Directory (AD) for Okta Universal Directory (UD). Why? Because UD can easily keep up with companies’ evolving directory and access management needs. Impossible? Read this infographic to see how AD was…

Top Organisations Are Automating Identity With Okta Workflows

More than ever, IT teams need automation to effectively manage their increasingly complex identity tasks—especially as their networks of end-users grow. And without the time or money to build these capabilities in-house, many are turning to modern, low-  to no-code solutions. Check out the infographic below to learn how three Okta customers have…

What are Salted Passwords and Password Hashing?

Security is often not top of mind when creating customer-facing applications. But in a landscape of continual data breaches of major corporations like T-Mobile and Google, companies must be vigilant to adhere to security best practices. Processes like password salting and hashing are fundamental to the security posture of your apps. Understanding…

It’s Official: Okta Joins Forces With Auth0

At Okta, we’ve spent the past 12+ years focused on transforming cloud-based identity and empowering everyone to safely use any technology. Today marks a significant milestone for our team and acceleration of our journey: Okta and Auth0 are now one team. We’ve successfully completed the acquisition. I’ve long admired the impressive platform and…

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorized people accessing them. In cybersecurity, authentication means verifying that a person or device…

What is a Domain Name System (DNS)?

What Is the Domain Name System (DNS)?  The domain name system (DNS) makes it possible for browsers, apps, and servers to load internet resources. Think of it like a phonebook—except instead of associating a person’s name with a phone number, it maps a domain name (e.g., okta.com) to an internet protocol (IP) address that can be understood by…

Tags

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube