August 28 - 30 | Las Vegas

Okta

Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Our Enduring Identity

Read More

Part Three: Bug Bounty  Programs —  Is Your Organization Ready?

Read More

Unveiling our Oktane17 keynote speakers

Read More

Introducing our "Identities" Series

Read More

How to Communicate the Value of Identity Management Solutions to Key Stakeholders

Read More
#LifeAtOkta
Technology
Partners
Company + Product
Customers + Partners
Industry Insight

InfoSec

Decoding Customer IAM (CIAM) vs. IAM

The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we - as an industry - talk about customer-facing use cases for IAM. Many are starting to refer to this as Customer IAM or Consumer IAM, both abbreviated as...

The Importance of SSO in Enterprise IAM

In today’s identity management climate, single sign-on (SSO) capability is critical to the success of enterprise identity and access management (IAM). IT departments face growing demands: managing thousands of users, both internal and external, who each need access to an increasing number of cloud-based applications. Adding to this complexity...

What is SCIM?

SCIM , or System for Cross-domain Identity Management, is an open standard that allows for the automation of user provisioning. It was created in 2011 as it became clear that the technology of the future would be cloud-based. SCIM communicates user identity data between identity providers (such...

Trick or treat? Seven treats for IT managers implementing Okta

It may be the season for jack ‘o lanterns, mummies and ghouls, but those creatures aren’t the scariest things that an IT manager could confront on a typical day. What’s more frightening are the amount of typical questions technical teams get from their teammates on how to use Okta....