Workforce Identity Cloud

Fine Grained Authorization and new Okta Privileged Access features: The latest in Okta product capabilities

Welcome back to Okta’s Quarterly Release Overview! We’re excited to showcase our Q1 innovations from January–March. Dive into the latest capabilities, including Fine Grained Authorization, new Okta Privileged Access and Okta Identity Governance capabilities, and more. Okta is the World’s Identity Company. We free everyone to safely use any…

Nonprofits at Work 2024: Mission-critical tech and security

Tech is mission critical The pandemic was a major turning point in nonprofits’ use of technology. Remote work required organizations to quickly adopt new tools to sustain employee productivity at home and connect with those they support. In the field, services began to be delivered digitally or with more digital components — increasing ease of use…

Okta Privileged Access and simplified developer experiences: The latest in Okta product capabilities

Welcome back to Okta’s Quarterly Release Overview! 2023 has come to an end, and we’re excited to showcase all of our Q4 innovations from October–December. Dive into the latest capabilities, including Okta Privileged Access (OPA), heightened security with phishing-resistant capabilities, and powerful integrations to extend Okta Identity processes…

Okta Privileged Access is generally available

We are thrilled to announce the general availability of Okta Privileged Access, our new privileged access management (PAM) offering, beginning this week. Okta Privileged Access is a powerful solution that elevates your security infrastructure and helps provide controlled access to your critical systems, applications, and data. This empowers your…

Behind the scenes at Access Requests: Worker tasks

Image generated using DALL-E Background Okta’s inbox platform supports various products in Okta’s Workforce Identity Cloud, where human input is required. It is most notably instrumental in the Access Request flow of Okta Identity Governance. A lot of what we do is trigger-based. These triggers can be a human action — “grant access when the…

The fed gov needs Workforce Identity — three reasons why

Serving in public service puts you on the front lines of digital bad actors and cyber attacks. For this reason, the call to upskill, expand, and diversify the government’s workforce can be seen all over our social feeds this Cybersecurity Awareness Month. The Biden Administration considers this concept the most fundamental building block for…

Archive