Authentication methods

Federation. Single sign-on. Multi-factor authentication. These are just a few of the authentication methods businesses deploy, granting privacy and security benefits that go beyond a simple password. Read on to find information on a number of innovative authentication methods that Okta can help you deploy.

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorized people accessing them. In cybersecurity, authentication means verifying that a person or device…

The Dogfooding Chronicles: WebAuthN—The Path to Passwordless

  In this edition of The Dogfooding Chronicles, we’re going to highlight an implementation we’re very excited about around here. Ever heard of WebAuthN? Read on to learn some tips and tricks we’ve learned in our WebAuthN enablement journey. Setting the stage – what is WebAuthN? Web Authentication API, aka WebAuthN, is one of the newest web…

Never Do Your Own Taxes—or Your Own Auth! (Mostly)

It’s Tax Day. A day of dread for some, an annual routine for others. Can you think of any other financially impactful space where a DIY vs professional choice is so widely debated? Sure, when you’re just starting out, you can do a lot of things on your own without too much damage. But as you grow and obtain new assets, you may want to hire…

Okta’s Annual 12 Days of Customers

As we prep our holiday shopping lists and pull out the festive sweaters, it’s almost time to look back on 2018. We want to use this season of reflection and cheer to showcase some of our many amazing customers. Our customers are the best gifts of all, so we’re celebrating with our annual 12 Days of Customers! JetBlue: The airline with a mission…

FACT OR FICTION: SSO Is the Same as a Password Manager

  At Okta, we are highly invested in the latest ideas and practices around authentication and security—and that requires some myth busting. This blog is the first in a series of posts meant to tackle common misunderstandings and myths around Single Sign-On (SSO). See below for our full list of the myths we've seen (and busted!) around SSO. Single…

Archive