Flag sensitive transactions for step-up authentication

Once a user has signed in, there may be parts of your platform you still want to safeguard with additional layers of security and access control. Sensitive resources are often safeguarded with step-up authentication.

Step-up authentication involves invoking an additional authentication factor, where you, the developer, have flagged it necessary to do so.

Actions with Okta CIC makes it easy for organizations to implement step-up authentication, and we have the template to prove it.

Pdf thumbnail

Download the white paper

By submitting, I agree to the processing and international transfer of my personal data by Okta as described in the Privacy Policy.