All About IT Infrastructure: What it is and How it's Evolving

IT infrastructure consists of all the core tech components that organizations need to get work done. While hardware, software, and networks are all widely acknowledged as the backbone of IT infrastructure, new technology trends are changing the ways we work and connect.   Cloud, identity, digital transformation, and distributed working models have…

Okta Workflow Connector Updates—Influenced by YOU

Okta’s own James Flores takes a deeper dive into connectors, the Workflows feature cycle, and how you can submit your own ideas into the mix. He also details some of the cool new features created based on your input. The video features the Okta Workflow Connector as well as other connectors. Intrigued? Watch the video!  

User Management: An Afterthought for Some, Prerequisite for Others

You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system? This scenario may sound odd, but…

Okta + Amazon Web Services: Automate AWS IAM Identity Center with Okta Workflows

Okta and AWS have done it again! For years we've supported identity federation with AWS IAM and tons of customers have taken advantage of this integration. In fact, our 2020 Business@Work Report lists it as one of Okta's “top 2” integrations. If you're unfamiliar with the integration, read on for a brief summary of the Okta + AWS collaboration…

Byte-Sized Video: Minimize the Impact of Basic Auth

It’s a pretty common situation: organizations spend their resources on maintaining legacy software and legacy protocols. Today, this is often supported by hybrid domain joined devices and Microsoft Azure AD. But did you know that this can actually lead to a lax security posture?  In this type of setup, any time your users log in to a Windows 10…

Byte-Sized Video: Don’t Limit the Scope of Your SSO and MFA

No matter how much you may love your users, you can’t trust all of them. With so many individuals and devices accessing your apps, and requests coming from various networks, there’s a real risk of bad actors slipping through the cracks. Single-sign on (SSO) and multi-factor authentication (MFA) are must-haves when it comes to modern security. To…

What Is Social Login and Is It Worth Implementing?

Social login, also known as social sign-in or social sign-on, uses information from social networking sites to facilitate logins on third-party applications and platforms. The process is designed to simplify sign-in and registration experiences, providing a convenient alternative to mandatory account creation. For users, social login is a…