Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

API

Why It’s Time to Break Up with Active Directory

Do you still use a cell phone designed in 1999? Would you risk letting your teenager drive a 20-year-old car with 20-year-old airbags? Probably not.

In an era of innovation and disruption, leading companies pride themselves on constantly adopting new and better technologies. So why is it that some...

How to use Webhooks with Okta

Connecting and sharing data across disparate systems is a critical part of modern-day software development. Nearly every application needs to communicate and share data across many services, both internally and externally. Businesses often have to connect internally built apps to external services such as Twilio for customer notifications, Stripe for...

Customer Identity Landscape: Building Highly Scalable Apps

Today’s customers have higher than ever expectations when it comes to their digital applications. These expectations are driving products to be more sophisticated with increasingly shorter release cycles. A pivotal component when building any customer-facing application is connecting directly to users, and an identity management system that is secure, scalable,...

Microservices Drive Flexibility. But Where Does Identity Fit In?

Up until recently, most technology architecture has been monolithic, with services and code contained within a single large and complex application. Now, we’re increasingly seeing architecture broken into autonomous units—or microservices—built for specific individual functions. Microservices increase the agility and scalability of an organization by allowing distributed teams to work...

5 Approaches to API Security

The goal when implementing API security is to safely ensure the right people and systems have access to the right things to accomplish their task in the shortest time necessary. In this blog we’ll take a quick look at the pros and cons of the 5 approaches to API security...

From Startup to Enterprise: Identity Solutions for Your Customers

Implementing an authentication solution to grant access to corporate applications—whether for customers or employees—is a top priority for CIOs today. There's a clear need for solid, reliable technology to deliver dependable access to the information people want to work with. It's important for customers to have an enjoyable experience signing...