The next chapter for Okta Privileged Access: Integrating Axiom to accelerate our roadmap
We recently announced something exciting: Okta signed a definitive agreement to acquire Axiom Security, a modern, identity-centric privileged access management (PAM) solution. Our teams plan to integrate key Axiom functionality into Okta Privileged Access over the coming months, which will allow us to expand access controls to more sensitive resources for Okta customers.
Okta Privileged Access is and will continue to be the single control plane for our customers’ privileged resources, whether on-premises or in the cloud, streamlining access and governance while eliminating standing privileges. Below, we answer some questions current customers might have.
What’s changing?
We’re excited to welcome new team members to help us build the leading neutral and independent identity platform. We believe Axiom and Okta Privileged Access complement each other in their approach to providing a modern PAM solution.
Both solutions help organizations unify access to critical infrastructure through centralized policy controls and full traceability to tie access back to an individual. Over the coming months, Axiom will be integrated into the Okta Privileged Access product, expanding capabilities available to existing customers.
Why Axiom?
It’s simple: Axiom allows us to deepen functionality and increase value to our customers.
Today, Okta Privileged Access supports passwordless, just-in-time access for Windows and Linux servers, a vault for privileged accounts (server local, SaaS service, Okta, and Active Directory), secrets management, and governance and auditing.
This acquisition allows us to accelerate our roadmap for expanded functionality around just-in-time access for databases and Kubernetes, while maintaining velocity on delivering other core functionality, such as support for Active Directory accounts.
What are the benefits for Okta Privileged Access customers?
This acquisition will help Okta customers extend their identity security fabric to more privileged accounts and resources, providing a single control plane for managing privileged access, whether on-prem or in the cloud.
- Just-in-time access: Eliminate standing privileges by providing automated, time-limited access only when needed. This reduces risk and operational overhead by helping ensure that elevated permissions are temporary and auditable.
- Unified control: Gain a single point of administration for privileged access across resources. This simplifies management and provides a holistic view of your security posture across on-premises and multi-cloud infrastructure, including critical resources like databases and Kubernetes.
- Deep coverage: Secure access to a broader range of critical resources. With new connectors and an AI-based application connector builder, the solution extends security to databases and Kubernetes environments, helping ensure least-privileged access and full traceability for auditing and compliance.
How much will it cost?
Okta Privileged Access will continue to be available under its current pricing model, based on resource units. Today, it’s available as part of our Okta Platform Suites or through stand-alone licensing. The functionality gained through this acquisition will be delivered as an enhancement to the existing product, which means customers will benefit without needing to purchase a separate product.
Our flexible resource unit licensing model will remain the same. Customers purchase a pool of resources units that can be applied to any combination of resources. This allows you to use your existing units to protect servers, users, service accounts, Active Directory accounts, and soon databases and Kubernetes.
As we integrate the technology into our roadmap, we’ll share more details on pricing, particularly for databases and Kubernetes. Our goal is to keep pricing straightforward and aligned with the value customers get from securing their privileged resources.
Why choose Okta for privileged access?
In today's dynamic, multi-cloud environment, managing privileged access is more complex than ever. Manual processes for permissions lead to security risks, compliance gaps, and operational inefficiencies, especially with the rise of non-human identities like AI agents. At this scale, siloed solutions and fragmented identity won’t work.
We hear from customers that this is true even when the products come from a single vendor. A unified contract is not the same as a unified platform. A collection of acquired tools without a unified view is a different kind of fragmentation, and it doesn’t make security or IT’s jobs any easier.
This is one of the key reasons organizations need to adopt an identity security fabric — a complete set of identity tools orchestrated up and down your tech stack to detect, prevent, and respond to identity attacks quickly. Orchestration is imperative. This allows organizations to leverage risk signal sharing to take real-time action when needed.

PAM is an integral part of an identity security fabric. Axiom will strengthen our existing PAM solution by broadening our reach into critical infrastructure resources, specifically databases and Kubernetes, which are highly privileged, valuable, and requested by today’s Okta customers.
If you have additional questions or want to learn more about Okta Privileged Access, reach out to your Okta representative.