Access Management

This page highlights the articles on this blog that relate to Okta’s Access Management (AM) capabilities such as SSO, MFA and Device Management, including core capabilities like Universal Directory.

Not all access management articles will be categorised for Access Management. You can look through the product-specific pages such as the Okta Device Access (ODA) page. Or you can just click the relevant category listed to the right of this page.


AM-Related Articles

The most recent AM-related articles are:

Farewell, Complexity: Platform SSO Simplified Setup on macOS 26 Powered by Okta and Jamf

Introduction The introduction of Platform Single Sign-On (SSO) by Apple was a major step, but with macOS 26 (Tahoe), the game has fundamentally changed. Apple introduced Simplified Setup for Platform SSO, fundamentally redefining the user experience. By leveraging this new framework, organizations using Okta for identity and Jamf Pro for device management can finally achieve…

Unifying Your Corporate PKI with Okta Device Access

Introduction While Okta can act as a Certificate Authority (CA), many enterprises prefer to leverage their existing Public Key Infrastructure (PKI), namely Microsoft Active Directory Certificate Services (ADCS). This technical guide provides a, step-by-step approach to using your own ADCS CA with Okta Device Access. We’ll delve into the process of creating a custom certificate…

Streamlining Windows Admin Recovery with Okta Device Access and Intune Integration

August 2025: This is an Early Access release Introduction In today’s interconnected enterprise landscape, robust identity and access management (IAM) is no longer a luxury but a fundamental pillar of cybersecurity. As organizations increasingly adopt cloud-first strategies and embrace a distributed workforce, securing endpoints, particularly Windows devices, becomes paramount. Okta Device Access significantly extends Okta’s…

Device Logout for macOS

August 2025: This is an Early Access release Introduction In today’s fast-paced enterprise environment, ensuring the security of user sessions across devices is more critical than ever. With employees accessing corporate resources from multiple macOS devices—laptops, desktops, and shared workstations—organizations face increasing risks from unauthorized access, session hijacking, and compromised credentials. The Okta Device Logout…

New Okta Group Push API

If you have been working with applications in Okta for some time and occasionally use the APIs (or Workflows) you would be aware that one glaring omission in the API library was an API to manage the Push Groups on applications. This has now been addressed with the Group Push Mapping API. The Group Push…

Okta Device Access: FIDO2 Passwordless Windows Login

July 2025: This is an Early Access Release Introduction This technical blog post offers an exploration of Okta Device Access Desktop MFA with FIDO2 Passwordless for Windows, a transformative solution designed to fundamentally redefine the Windows login experience. We’ll dissect the technical intricacies of its implementation, delineate the critical requirements for seamless integration, and illuminate…

Cross-Platform Endpoint Security: Integrating Okta and CrowdStrike for Windows and macOS

Introduction In today’s dynamic and hybrid work environments, ensuring that only trusted and secure devices can access corporate resources is a fundamental pillar of a Zero Trust strategy. Device posture, including real-time security health and risk state, is critical in enabling secure access decisions — and this is where the integration between Okta and CrowdStrike’s…

“Enhancing Zero Trust with Okta Identity Threat Protection and Jamf Security: Continuous Access Evaluation Through Shared Security Signals”

Introduction In today’s rapidly evolving threat landscape, identity is the new security perimeter. Organizations face sophisticated cyber threats that target user credentials, exploit access gaps, and challenge traditional security measures. To stay ahead, IT and security teams need a proactive, intelligent approach to identity protection—one that not only detects threats but also responds in real…

Mastering Okta Device Access: A Comprehensive Guide to Deploying Desktop MFA with Microsoft Intune

Requirements This blog post will serve as a comprehensive guide to deploying and configuring Okta Device Access (ODA) Desktop MFA for Windows using Microsoft Intune. Below are the key requirements to ensure a successful implementation. Okta Requirements Microsoft Intune Requirements Okta Desktop MFA Configuration In the Admin Console, go to Settings, Account, Embedded widget sign-in support.And ensure…