How to leverage Okta's Microsoft External Authentication Method application with Entra ID
Author: jeffhawthearchitect
Supporting Shared Accounts via SAML
This article explains how you can extend and configure Okta within the shared account use case. Credits to Nicholas Connelly for sharing this approach. Disclaimer: This approach is not part of security best practices because it can be exploited and be abused by rogue administrators. I would recommend to look at this workaround if you … Continue reading Supporting Shared Accounts via SAML
Leveraging Microsoft Authenticator as a Possession Factor with Okta
Please read the disclaimer first before you start implementing the approach DISCLAIMER: Okta Documentation mentions that configuring Microsoft Azure Active Directory (AAD) can't be used as an IDP Authenticator. This article will test that statement hence if you decide to implement this in your own Okta production org/instance and got into any production issues, Okta … Continue reading Leveraging Microsoft Authenticator as a Possession Factor with Okta
2024, A new era for spatial computing, augmented reality and a world without passwords.
Two months into 2024, Apple finally released its new product, Apple Vision Pro. Apple claims the Apple Vision Pro is “a revolutionary spatial computer that seamlessly blends digital content with the physical world, while allowing users to stay present and connected to others.” The release of Apple Vision Pro opens up the world of multiple … Continue reading 2024, A new era for spatial computing, augmented reality and a world without passwords.
How to re-engage dropped-off users from Okta’s Self-Service Registration Process
Re-engage users who dropped off during the self-service registration process done via Okta's service
Better Together Series: Microsoft Azure Sentinel + Okta
By integrating Okta with Azure Sentinel, you can correlate and pinpoint system-related attacks that may have been initiated via account takeovers, suspicious behaviour, MFA push bombs and other identity-related attacks. This also allows you to proactively quartine, prevent and contain any further/collateral damage that could happen if the risky event wasn't handled appropriately and timely.
Better Together Series: Integrating Power Platform with Okta’s Workforce Identity Cloud
Seamless Identity and Access management with Power Platform (PowerApps) through Okta's Workforce Identity Cloud
Phishing Resistant Authenticators in action through Okta Fastpass
In this blog, I will showcase how Okta is able to prevent and stop phishing attempts crafted by EvilGinX (MiTM) to your end users. Aside from preventing the phishing attempt, Okta can also be configured to orchestrate back-end orchestration flows that will raise awareness to your end users and also deliver a SecOps capability.
Access Certification for In-active application users
How can you leverage Okta Workflows and Identity Governance to review in-active users in your application
How 3rd Party Partners can relay/forward the actual origin IP using the Okta Factor APIs
Enrich the Okta Verify Location context using the actual end user's location

IAMSE