Company + Product

Company + Product

New Okta and Yubico integration delivers phishing-resistant authentication at enterprise scale

In October 2023, Okta and our integration partner Yubico jointly announced Yubico FIDO Pre-reg, which delivers pre-enrolled YubiKeys for phishing resistance and a streamlined passwordless onboarding experience for enterprises. Following several months of Early Access to select customers and continued investments, this first-to-market service will…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorization credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

Fine Grained Authorization: A flexible solution for all

Authorization is evolving. Users demand more nuanced access controls and privacy, while security and compliance teams need precise permission management. Enter a new approach: Okta Fine Grained Authorization. Now, you can manage your teams’ need for precise permissions while maintaining independence from any Identity provider (IdP), including but…

Customize signup and login with Forms, Okta’s no-code extensibility feature now Generally Available

In today’s fast-paced digital world, adaptability and efficiency are key. The challenge for many businesses is balancing technical flexibility with evolving business needs. We’re excited to announce that Forms is now Generally Available. This powerful feature within Okta Customer Identity Cloud’s extensibility offering is set to transform how…

Tools for detecting and responding to potential threats post authentication

If a data breach happens at your organization,  you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited…

Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

Archive