Engineering

Uninterruptible testing at Okta

Problem statement Every product needs some measure of testing; security products need more than most. Achieving the confidence, product quality, and product safety necessary for an industry-critical solution such as Okta could be done with infinite resources, infinite money, and infinite time. Until those are available, alternative solutions are…

Behind the scenes at Access Requests: Worker tasks

Image generated using DALL-E Background Okta’s inbox platform supports various products in Okta’s Workforce Identity Cloud, where human input is required. It is most notably instrumental in the Access Request flow of Okta Identity Governance. A lot of what we do is trigger-based. These triggers can be a human action — “grant access when the…

Phishing resistance in unmanaged iOS devices

Contributing to approximately 60% of all social engineering attacks and 36% of all data breaches, phishing claims the number one spot among cybercrimes. With 80–90% of all compromises originating from an unmanaged device, unmanaged iOS devices deserve a place at the top of your security concerns.     Okta FastPass Okta FastPass protects users…

Okta and Google Chrome Enterprise: Enhanced application protections with device assurance

As the digital landscape evolves, the need for robust security measures becomes increasingly critical. Organizations are constantly exploring innovative ways to ensure secure access to their systems and data. In this pursuit, Okta has taken a significant step forward by integrating its device assurance policies with Google's Device Trust Connector…

Archive