This blog is a series of articles on Identity and Access Management (IAM) from a group of Okta Sales/Solution Engineers (SEs). You will find Okta-centric articles and IAM domain articles, some written here and others collected from other sites where we wrote them.
See the blocks down the side to navigate between pages, categories, tags and authors.
Recent Articles

Okta Custom Domain Configuration with Let’s Encrypt Certificates
This guide will walk through the process of changing your Okta URL to a custom domain. In this guide, I’ll be using my domain hogwartsadmin.com, which has been purchased through GoDaddy, Let’s Encrypt (TLS Certificate) and Google’s Dig for (DNS Lookup). Step 1: Decide on and enter custom domain name in your Okta Tenant Once … Continue reading Okta Custom Domain Configuration with Let’s Encrypt Certificates →
Customize Auth0 Universal login page using React
Auth0 provides several ways of changing login experience based on the level customization you need. You can use Auth0’s new universal login page which allows you to use Liquid template language to customize the login page. You can find out more about this approach in Auth0 documentation. Auth0 has also another universal login page which … Continue reading Customize Auth0 Universal login page using React →
OIG Access Requests – Using the New Timer Feature
This article explores the new Timer feature in Okta Identity Governance (OIG) Access Requests. It provides an overview of the new function and how it could be used for a long-term (days or weeks) access request and a short-term (hours) privileged access request. This article assumes a familiarity with the OIG Access Requests workflows. For … Continue reading OIG Access Requests – Using the New Timer Feature →
Historical Reporting of OIG Access Requests
A common request asked is how to look at past access request events. Currently you can see the results of the requests in the Okta System Log and also in the Okta Identity Governance (OIG) Access Requests admin console. This article will explore these. Article contents: This is still an early release product, so expect … Continue reading Historical Reporting of OIG Access Requests →
Designing OIG Access Requests for Ease of Use
Access Requests are designed to be used by all people in an organisation. So making the interface and information presented be more user friendly should be a goal of any deployment. In this article we look at what information is presented to end-users by Okta Identity Governance (OIG) Access Requests and how you can use … Continue reading Designing OIG Access Requests for Ease of Use →
OIG Access Requests – Requesting Access in Slack
A key benefit of Okta Identity Governance is the ability to interface with access request flows via chat tools such as Slack and Microsoft Teams. This article provides a summary of the different ways users can request access in Slack and how to monitor the progress of a request in Slack. Article contents: Overview of … Continue reading OIG Access Requests – Requesting Access in Slack →
Event Hook Filtering and Okta Workflows
Event Hooks are outbound calls from Okta, sent when specified events occur in your tenant. They take the form of HTTPS REST calls to a URL you specify, encapsulating information about the events in JSON objects in the request body. These calls from Okta are meant to be used as triggers for process flows within … Continue reading Event Hook Filtering and Okta Workflows →

Manage user devices authorised to access applications
Fine grained Device level authorisation was not really possible before devices became a first class citizen in the Okta Identity Engine. User Devices (with Okta FastPass installed) could always be Suspended or Deactivated in OIE (Directory → Devices), but this would prevent the user from using their device to access any applications in Okta. This … Continue reading Manage user devices authorised to access applications →
Manage Short Term Users with Okta Workflows
Okta Workflows makes it easy to automate identity processes at scale – without writing code. Use if-this-then-that logic, Okta’s pre-built connector library, and the ability to connect to any publicly available API to enable anyone to innovate with Okta. Workflows templates provide flow builders with pre-built, configurable flows for common identity automation use cases. Flogrammers can … Continue reading Manage Short Term Users with Okta Workflows →
Password Import Hook with Java Endpoint
This blog post is an additional add-on to Dany’s post on Office 365 / Azure AD seemless Users and Password’s Migration to Okta In this post, we will replace the Okta Workflows implementation of the hook endpoint with a Java service. Webhooks are user-defined HTTP callbacks and are usually triggered by some event. Okta’s implementation … Continue reading Password Import Hook with Java Endpoint →
Integrating ServiceNow with OIG Access Requests
One of the standard integration points with Okta Identity Governance (OIG) Access Requests is to log a ticket of an access request in an ITSM tool like ServiceNow. This article explores the integration between OIG Access Requests and ServiceNow. Article contents: Overview of Integration The primary focus of the Okta Identity Governance (OIG) Access Requests … Continue reading Integrating ServiceNow with OIG Access Requests →

Minimizing Bot Abuse with Okta Captcha
As an option to increase org security, Okta supports CAPTCHA to prevent automated sign-in attempts. You can integrate either of two services: hCaptcha or reCAPTCHA v2.
Okta Workflows Connector Builder
Okta Workflows makes it easy to automate identity processes at scale – without writing code. Using the if-this-then-that logic, Okta’s pre-built connector library and the ability to connect to any publicly available API, anyone can innovate with Okta. Okta’s Workflows Connector Builder is a no-code development tool for creating connectors on the Workflows platform. It leverages … Continue reading Okta Workflows Connector Builder →
OIG Access Requests – What Else Can You Do?
The Okta Identity Governance (OIG) Access Requests module is built for requesting (and reviewing/approving) access to applications or groups in Okta. However, the module can do a lot more with the actions provided for the Okta integration. This article explores these and gives some examples of how they can be used. Article contents: Please note … Continue reading OIG Access Requests – What Else Can You Do? →
Okta Sign On Error Message Customizations
With the increase of Adaptive MFA use case and all the different combination of posture presented to evaluate the sign in into a resource, organisations require to customize their messaging to their end users to provide context and reduce the login experience friction. Keep in mind that for security reason we may not want to … Continue reading Okta Sign On Error Message Customizations →
Loading…
Something went wrong. Please refresh the page and/or try again.