Welcome

This blog is a series of articles on Identity and Access Management (IAM) from a group of Okta Sales/Solution Engineers (SEs). You will find Okta-centric articles and IAM domain articles, some written here and others collected from other sites where we wrote them.

See the blocks down the side to navigate between pages, categories, tags and authors.

Recent Articles

Okta Custom Domain Configuration with Let’s Encrypt Certificates

This guide will walk through the process of changing your Okta URL to a custom domain. In this guide, I’ll be using my domain hogwartsadmin.com, which has been purchased through GoDaddy, Let’s Encrypt (TLS Certificate) and Google’s Dig for (DNS Lookup). Step 1: Decide on and enter custom domain name in your Okta Tenant Once … Continue reading Okta Custom Domain Configuration with Let’s Encrypt Certificates

OIG Access Requests – Using the New Timer Feature

This article explores the new Timer feature in Okta Identity Governance (OIG) Access Requests. It provides an overview of the new function and how it could be used for a long-term (days or weeks) access request and a short-term (hours) privileged access request. This article assumes a familiarity with the OIG Access Requests workflows. For … Continue reading OIG Access Requests – Using the New Timer Feature

OIG Access Requests – Requesting Access in Slack

A key benefit of Okta Identity Governance is the ability to interface with access request flows via chat tools such as Slack and Microsoft Teams. This article provides a summary of the different ways users can request access in Slack and how to monitor the progress of a request in Slack. Article contents: Overview of … Continue reading OIG Access Requests – Requesting Access in Slack

Manage user devices authorised to access applications

Fine grained Device level authorisation was not really possible before devices became a first class citizen in the Okta Identity Engine. User Devices (with Okta FastPass installed) could always be Suspended or Deactivated in OIE (Directory → Devices), but this would prevent the user from using their device to access any applications in Okta. This … Continue reading Manage user devices authorised to access applications

Manage Short Term Users with Okta Workflows

Okta Workflows makes it easy to automate identity processes at scale – without writing code. Use if-this-then-that logic, Okta’s pre-built connector library, and the ability to connect to any publicly available API to enable anyone to innovate with Okta. Workflows templates provide flow builders with pre-built, configurable flows for common identity automation use cases. Flogrammers can … Continue reading Manage Short Term Users with Okta Workflows

Integrating ServiceNow with OIG Access Requests

One of the standard integration points with Okta Identity Governance (OIG) Access Requests is to log a ticket of an access request in an ITSM tool like ServiceNow. This article explores the integration between OIG Access Requests and ServiceNow. Article contents: Overview of Integration The primary focus of the Okta Identity Governance (OIG) Access Requests … Continue reading Integrating ServiceNow with OIG Access Requests

Okta Workflows Connector Builder

Okta Workflows makes it easy to automate identity processes at scale – without writing code. Using the if-this-then-that logic, Okta’s pre-built connector library and the ability to connect to any publicly available API, anyone can innovate with Okta. Okta’s Workflows Connector Builder is a no-code development tool for creating connectors on the Workflows platform. It leverages … Continue reading Okta Workflows Connector Builder

OIG Access Requests – What Else Can You Do?

The Okta Identity Governance (OIG) Access Requests module is built for requesting (and reviewing/approving) access to applications or groups in Okta. However, the module can do a lot more with the actions provided for the Okta integration. This article explores these and gives some examples of how they can be used. Article contents: Please note … Continue reading OIG Access Requests – What Else Can You Do?

Loading…

Something went wrong. Please refresh the page and/or try again.