We're Hiring

Engineering Manager - Toronto
Senior/Staff/Principal Software Engineer – UI Integration Infrastructure
Sr. Mgr, Business Development
Director/Senior Product Manager (Strong Authentication)
Director/Sr. Product Manager
Platform Solutions Intern - Summer Internship 2015
Product Marketing Manager - Business Value Assessment
Technical Marketing Intern - Summer Internship 2015
Technical Marketing Manager
Sr. Curriculum Developer
Sr. Customer Success Manager
Sr. Customer Success Manager
Sr. Director - Training
Technical Instructor
Manager, Marketing Operations
Manager, Professional Services Operations
Expert Services Program Manager
Professional Services Project Manager
Sr. Technical Consultant, Professional Services
Sr. Technical Consultant, Professional Services
Sr. Technical Consultant, Professional Services
Sr. Technical Consultant, Professional Services
Sr. Technical Consultant, Professional Services
Sr. Technical Consultant, Professional Services
Sr. Technical Consultant, Professional Services
Technical Manager
Engineering Manager - San Francisco
Engineering Manager - Seattle/Bellevue
Information Security Analyst - Cloud
Principal Site Reliability Engineer
QA Manager
Quality Engineer - Adaptive Authentication (Sr./Staff/Principal)
Quality Engineer - Performance
Release Project Manager
Senior/Staff/Principal Software Engineer – UI Universal Directory (SF, Seattle, Toronto, Austin)
Site Reliability Operator
Software Architect
Software Engineer - Analytics & Reporting (Sr./Staff/Principal)
Software Engineer - Android (Sr./Staff/Principal)
Software Engineer - Core Technology (Sr./Staff/Principal)
Software Engineer - Directories Platform
Software Engineer - Federations Platform
Software Engineer - O365 Identity Management (Sr./Staff/Principal)
Software Engineer - O365 Identity Management (Sr./Staff/Principal)
Software Engineer - Office 365 Okta Cloud Connect (Sr./Staff/Principal)
Software Engineer - Office 365 Okta Cloud Connect (Sr./Staff/Principal)
Software Engineer - Performance (Sr./Staff/Principal)
Software Engineer - Security (Sr./Staff/Principal)
Software Engineer - Security (Sr./Staff/Principal)
Software Engineer - UI - Adaptive Authentication (Sr./Staff/Prin.)
Software Engineer - UI (Sr./Staff/Principal)
Software Engineer - UI/Data Visualization (Sr./Staff/Prin.)
Software Engineer - Universal Directory (Sr./Staff/Principal) SF/Seattle/Austin/Toronto
Software Engineer in Test - Analytics & Reporting (Sr./Staff/Principal)
Software Engineer in Test - O365 Identity Management
Software Engineer in Test - Technical Operations (Sr/Staff/Principal)
Software Engineer in Test - UI/Selenium (Sr./Staff/Principal)
Sr. Analyst, Security and Compliance
Sr. Software Engineer - Integration Infrastructure
Staff Engineer – Network and Security Lab
UX Designer
FP&A Analyst
Manager, Global Compensation
Sr. Penetration Testing Engineer
Paralegal
Customer Marketing Associate
Senior Marketing Campaign Manager
Enterprise - Regional Sales Manager (Atlanta)
Enterprise - Regional Sales Manager (Kansas City or St. Louis)
Enterprise - Regional Sales Manager, Atlanta
Field Corporate Account Executive - Central (TOLA)
Field Corporate Account Executive - MI/OH/IN/WI
Sales Development Representative
Sales Engineer
Sales Engineer - East
Sr. Manager of Sales Development
Sr. Sales Engineer
Technical Support Engineer
Senior Manager, Business Development

Easy to Use, Yet Powerful Access Rules

Flexible Identity Management Policy for Security and Control

Okta offers a simple to use yet powerful framework to let you create identity management policies that govern the access of people to applications. Whether it’s restricting access to applications based on time of day, or adding additional authentication factors based on physical location, Okta’s identity management policy framework lets you quickly and easily add additional security measures to your IT solutions.

Identity management assignment policy

Identity management assignment policy

Application Assignment and Provisioning Policy

Okta policy can be used to ensure that the right people have the right access. Users granted access to an application in Okta can sign in, and have their application accounts automatically created using Okta’s user provisioning capabilities. When a user’s access is revoked in Okta, sign in is blocked and the account is automatically deactivated.

Access to applications can be granted individually, or by group. Group membership can be managed within Okta, or driven from an external directory service such as Active Directory. In this way, applications can be assigned to an Active Directory security group and users added from that group will be automatically be provisioned accounts and granted application access.

Identity management authentication policy

Identity management authentication policy

Authentication Policy

Use Okta to control how users should authenticate to your applications. There are two types of policies that can be used with the Okta Authentication Policy framework:

  • Multifactor authentication policy based on group, location and resource
  • Single factor authentication policy to determine when to use username and password and when to use Integrated Windows Authentication. This can also be enforced based on the user’s location.

Identity management access policy

Identity management access policy

Access Policy

Additional restrictions can be placed on application access to enhance security and ensure compliance with access policies required by your unique business. For example, it’s possible to set policies in Okta that allow access to benefits applications to all users, regardless of location, but to prevent hourly workers from accessing work related application when not in your offices. Identity and access management policies can be built with any combination of user, group, location and application.

Enterprise-grade identity & mobility management for all your apps, users & devices

Try Okta Free