Identity Security

This page highlights the articles on this blog that relate to Okta’s Identity Security capabilities such as ISPM. There is a great article titled What is Identity Security on the Okta site.

Not all identity security articles will be categorised for Identity Security. You can look through the product-specific pages such as the Okta ISPM page or the Okta ITP page. Or you can just click the relevant category listed to the right of this page.


Identity Security-Related Articles

The most recent Identity Security-related articles are:

The Okta ITP Workflows Connector

In May 2025 Okta released a Workflows connector for Identity Threat Protection with Okta AI, called the Okta ITP connector. This article is a brief walkthrough of the connector. Introduction With the release of Identity Threat Protection with Okta AI (ITP), new capabilities have been added to the Okta Workforce Identity platform for risk evaluation/detection…

Using Risk in Okta to Manage Privileged Access in OPA

Identity Threat Protection with Okta AI will continuously assess user context and automatically respond to identity threats across your ecosystem. This includes managing entity (user) risk levels. Okta Privileged Access does not explicitly have user risk built in, but user risk can be applied to control how users access privileged resources. This article looks at…

Device Logout for macOS

August 2025: This is an Early Access release Introduction In today’s fast-paced enterprise environment, ensuring the security of user sessions across devices is more critical than ever. With employees accessing corporate resources from multiple macOS devices—laptops, desktops, and shared workstations—organizations face increasing risks from unauthorized access, session hijacking, and compromised credentials. The Okta Device Logout…

Role Analysis with Okta ISPM – Are My Groups and Roles Being Used Effectively

Okta Identity Security Posture Management (ISPM) performs analysis on groups and roles which can be used to tune access via groups/roles and reduce risk. This article explores how to use ISPM for role analysis. Background Roles and a role-based identity system have been the Holy Grail for identity governance and administration (IGA) practitioners and products…

ISPM Architecture

This article provides a brief introduction to the architecture of Okta Identity Security Posture Management (ISPM). The following figure provides an overview of the architecture. We will break it up into the Input, Service, Console with Users/Roles and Output. Input ISPM is fed from different sources. The main source is from other customer systems, such…

“Enhancing Zero Trust with Okta Identity Threat Protection and Jamf Security: Continuous Access Evaluation Through Shared Security Signals”

Introduction In today’s rapidly evolving threat landscape, identity is the new security perimeter. Organizations face sophisticated cyber threats that target user credentials, exploit access gaps, and challenge traditional security measures. To stay ahead, IT and security teams need a proactive, intelligent approach to identity protection—one that not only detects threats but also responds in real…

Global Token Revocation – Auth0 Universal Logout integration with Okta

Auth0 has launched native support for Global Token Revocation and Okta’s Universal Logout functionality. This means that Auth0 applications now natively support the ability for federated Okta customers to automatically revoke all of the users sessions and tokens when Identity Threat Protection detects malicious or suspicious behaviour. Now, Auth0 powered applications can offer the same…

Okta AI agent for Natural Language Querying

Introducing the AI Agent for Okta This is a technical deep dive for the AI agent for Okta (created by Fctr) which is a powerful, open-source tool that lets IAM engineers, managers, and auditors query their Okta tenants using plain English. Get ready to streamline workflows, save countless hours spent scripting to create the necessary…

Enhancing Security with Okta Identity Threat Protection and Omnissa

Introduction In today’s rapidly evolving threat landscape, maintaining robust security while ensuring seamless access is a critical challenge for organizations. Continuous Access Evaluation (CAE), powered by Security Signal Sharing between Okta Identity Threat Protection (ITP) and Omnissa, introduces a revolutionary approach to adaptive threat response. By leveraging real-time data sharing and integration, this collaboration enhances…