sso

How Okta + AWS IAM Identity Center Simplifies Admin and Adds CLI Support

Millions of users across an array of enterprises depend on the cloud infrastructure of Amazon Web Services (AWS) and the seamless convenience of Okta Single Sign-On (SSO) to power their web and mobile platforms. The demand for cloud-enabled identity and access management (IAM) has exploded across the business landscape. And as organizations move…

Stories from the Trenches: Scale & Growth in the Cloud

Rubrik burst onto the scene in 2014 as a leading provider of cloud-based data management and protection solutions. The Church of Jesus Christ of Latter-day Saints was founded in 1830, and over its long history has become a nexus of philanthropy and faith. At first glance, these two organizations have little in common—but there’s more to this odd…

How Thoughtworks Gained Better Security and Increased Productivity—by Losing Their Dependence on AD

Thoughtworks began its journey away from Active Directory (AD) less than three years ago, though Philip Ibarrola, Thoughtworks TechOps Head of Technology, says it was a long time coming. Thoughtworks was once a Microsoft-only shop: Microsoft servers, Windows-based laptops, and security and authentications, all managed by AD. But since 2011, the…

The Secret Features of Okta Access Gateway: Part 3: Maintenance Mode

At Okta, we love to secure access to everything, from cloud apps, to consumer apps, to servers, and infrastructure—from a single platform. And that, of course, includes on-premises apps. In our new series The Secret Features of Okta Access Gateway, we’re going to explore some of the best secret features of Okta Access Gateway (OAG) to secure…

Rethinking AD: The Four Stages of Separation, Part 2

In part one of The Four Stages of Separation from Active Directory (AD), we covered stages 1 - 3: 1. Where are you today? 2. Make sure you’re safe, and 3. Get everyone together. In part 2, we’ll cover Stages 4.1 and 4.2, and we’ll describe a few customers who started this journey and detail where they are today. Still wondering why you should…

Rethinking AD: The Four Stages of Separation, Part 1

In the first blog of this series, we explained why it’s time to break-up with Active Directory (AD). In the second, we listed the top five things you can look forward to after making the change. So now we’re breaking down the four stages of separation you’re going to experience as you reduce your dependency on, and potentially leave, Active…

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both…

Understand Web Access Management—Then Move On

Figuring out how to secure users’ connections to applications is an age-old challenge that has developed alongside the digital transformation of the enterprise. Traditionally, businesses have addressed this issue with complex authorization systems, many of which used web access management (WAM)—or on-premises single sign-on (SSO)—at the center of…

Archive