In this article, you'll learn how client authentication works with Okta for applications that need to request access tokens securely. The "client" here refers to a server-side or browser-based application or machine making a token requests. We'll walk through different authentication methods supported by Okta, including how to generate your own key pairs and create … Continue reading Understanding Client Authentication with Okta
Category: Okta CIAM
Automated Unit Testing with the Auth0 Actions Testing library
This article provides a step-by-step guide on setting up an automated unit test suite for Auth0 Actions using Kilterset's Auth0 Actions Testing library. It emphasizes the importance of automated tests for maintaining code reliability and offers practical instructions on creating tests, setting up the testing library, and running tests in the CI/CD pipeline.
Token protection (DPoP) with Okta
DPoP brings additional security to accessing both Okta APIs and external APIs. This article outlines the implementation steps to integrate applications with Okta using DPoP to prevent the misuse of authorization tokens.
Secure your tokens – an introduction to DPoP
ππ«π¨π¨π-π¨π-π©π¨π¬π¬ππ¬π¬π’π¨π§ capabilities are becoming pivotal in ensuring application token security with the increasing adoption of OAuth-based access management. πππ¨π, or πππ¦π¨π§π¬ππ«πππ’π§π ππ«π¨π¨π π¨π ππ¨π¬π¬ππ¬π¬π’π¨π§ is a relatively new standard that comes with promising security features, especially for the internet-facing open applications.
Securely verify transactions – Can CIBA lead the way?
Client-Initiated Backchannel Authentication (CIBA) is rapidly gaining traction and showing promise in delivering a secure and seamless experience during sensitive transaction verification within a digital application. Here are some notes about this interesting development and how Okta is pioneering its adoption.
OKTA Workflows : the best is yet to come
In my previous article, I gave you a brief introduction to Okta workflows, in order to arouse your curiosity as to the potential of this tool. On the face of it, if youβre here, thatβs the case (if youβve seen the light and gone in, thatβs good too!). Today, Iβm going to take the presentation … Continue reading OKTA Workflows : the best is yet to come
Introduction to OKTA Workflows: nothing is impossible (almost)!
A test workflow from one of our tenants If youβre here, you probably know what Okta is. But if you donβt, we wonβt hold it against you (promise!). Okta offers an IAM (Identity Access Management) solution, enabling you to centrally and securely manage your usersβ identities and access to the resources they need to access. … Continue reading Introduction to OKTA Workflows: nothing is impossible (almost)!
Learn How to use Workflows for Inline Hooks
ImportantCreate Inline Hook With this release of low-latency flows, Okta has laid the groundwork for supporting any web hook that is time sensitive. Traditionally, organizations have to spend engineering effort to build, deploy, host, and manage their own system in order to enrich a user's profile (token or session), or notify/remediate a security threat. Those … Continue reading Learn How to use Workflows for Inline Hooks
Setup Auth0 as an External IDP
If users are mastered in an Auth0 tenant and you would like to provide those users access to an Okta tenant, then this is how you can configure Auth0 as an external IDP using OIDC. Step 1 - Configure Auth0 Perform the following steps in your Auth0 tenant: In the Auth0 administration console, create a … Continue reading Setup Auth0 as an External IDP
