single sign-on

Juggling multiple login credentials isn’t just a chore for end users; with the amount of cumbersome password resets they must facilitate, IT suffers, too. SSO simplifies the process from both sides, giving users a single point of access and self-service rest options, and Okta’s take is one of the best. Here’s why.

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorization credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

Byte-Sized Video: Don’t Limit the Scope of Your SSO and MFA

No matter how much you may love your users, you can’t trust all of them. With so many individuals and devices accessing your apps, and requests coming from various networks, there’s a real risk of bad actors slipping through the cracks. Single-sign on (SSO) and multi-factor authentication (MFA) are must-haves when it comes to modern security. To…

Announcing Okta SSO for HashiCorp Terraform Cloud for Business

Companies of all kinds and sizes are adopting more cloud infrastructure and employing DevOps programs to streamline the delivery and operations of software. In doing so, they begin to foster a culture of automation that spans people, process, and technology. As a leading provider of open source technologies across the infrastructure landscape,…

What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorized access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

How Okta + AWS IAM Identity Center Simplifies Admin and Adds CLI Support

Millions of users across an array of enterprises depend on the cloud infrastructure of Amazon Web Services (AWS) and the seamless convenience of Okta Single Sign-On (SSO) to power their web and mobile platforms. The demand for cloud-enabled identity and access management (IAM) has exploded across the business landscape. And as organizations move…

Stories from the Trenches: Scale & Growth in the Cloud

Rubrik burst onto the scene in 2014 as a leading provider of cloud-based data management and protection solutions. The Church of Jesus Christ of Latter-day Saints was founded in 1830, and over its long history has become a nexus of philanthropy and faith. At first glance, these two organizations have little in common—but there’s more to this odd…

Our Customers Are Tidying Up IAM—Here’s How

We’ll be the first to say that modern identity and access management (IAM) systems are complex. On the one hand, they need to be powerful enough to deal with multiple identity silos and application technologies. And on the other, they need to operate with legacy infrastructure. With the wrong system in place, this complexity can cost time and…

Archive