Okta Identity Engine

Tako AI v1.3: Major Updates Just in Time for Oktane 25

As we eagerly await Oktane 25, we at Fctr Identity are thrilled to share that Tako AI has been hard at work preparing some game-changing features for the identity management community. While everyone’s buzzing about what Okta will unveil at their annual event, we couldn’t wait to share our latest innovations that are reshaping how…

Streamlining Windows Admin Recovery with Okta Device Access and Intune Integration

August 2025: This is an Early Access release Introduction In today’s interconnected enterprise landscape, robust identity and access management (IAM) is no longer a luxury but a fundamental pillar of cybersecurity. As organizations increasingly adopt cloud-first strategies and embrace a distributed workforce, securing endpoints, particularly Windows devices, becomes paramount. Okta Device Access significantly extends Okta’s…

“Enhancing Zero Trust with Okta Identity Threat Protection and Jamf Security: Continuous Access Evaluation Through Shared Security Signals”

Introduction In today’s rapidly evolving threat landscape, identity is the new security perimeter. Organizations face sophisticated cyber threats that target user credentials, exploit access gaps, and challenge traditional security measures. To stay ahead, IT and security teams need a proactive, intelligent approach to identity protection—one that not only detects threats but also responds in real…

An Introduction to Managing SaaS Shared (Service) Accounts in OPA

Late in 2024 Okta released a new feature for Okta Privileged Access – the ability to manage SaaS shared accounts using the same approach to managing access to other privileged resources like servers. This article provides an introduction to this new feature. This article assumes the reader is familiar with Okta Privileged Access. If not,…

Mastering Okta Device Access: A Comprehensive Guide to Deploying Desktop MFA with Microsoft Intune

Requirements This blog post will serve as a comprehensive guide to deploying and configuring Okta Device Access (ODA) Desktop MFA for Windows using Microsoft Intune. Below are the key requirements to ensure a successful implementation. Okta Requirements Microsoft Intune Requirements Okta Desktop MFA Configuration In the Admin Console, go to Settings, Account, Embedded widget sign-in support.And ensure…

AI Agent for OKta

Okta AI agent for Natural Language Querying

Introducing the AI Agent for Okta This is a technical deep dive for the AI agent for Okta (created by Fctr) which is a powerful, open-source tool that lets IAM engineers, managers, and auditors query their Okta tenants using plain English. Get ready to streamline workflows, save countless hours spent scripting to create the necessary…

Automating Realm Creation in Okta with Workflows

The new Realms feature in the Okta Workforce platform and the Secure Partner Access (SPA) product built on top of it are designed to make management of discrete user populations simpler. Realms can be managed via the Okta Admin Console. But what about when you want to automate the process, such as onboarding a large…

Assigning Administrators to Realms in Okta

Realms were introduced into Okta to provide an alternative mechanism for delegated administration with discrete user populations. A key aspect of this is the administration – you may need to have different types of administrator roles for the users in the realm, but also allow cross-realm roles. In this article we explore configuring administrators for…

An Introduction to Realms in Okta

Okta recently added a new feature to the Universal Directory called Realms. This article provides an overview of the new feature. Note that Realms is only available with the Okta Identity Governance and Secure Partner Access products. At the time of writing this article, Realms is in Early Access. Background – Why do we need…

Okta Secure Partner Access Solution

Description: In this document we will go over the high-level overview of the Secure Partner Access (SPA)  solution in Okta. Also, we will go over the setup of Realms and Partner Admin Portal. Prerequisite: Use case: The Partner Admin Portal is a delegated admin portal designed to manage partner user access. The Partner Admin Portal…

Factor Sequencing on OIE: Authentication Method Chains

When OIE was released it championed assurance levels rather than specific authenticators. This provided a better experience for the majority of users and administrators. This ease of use came at the cost of easily being able to specify specific factors or factor orders which some customers required typically for compliance or regulatory reasons. Many of…

 Active Directory Bidirectional Group Management

Description: This document describes how to set up Access Requests and Certification for AD-sourced groups imported into Okta. Pre-requisites: Use Case: AD groups are used for securing access to applications, servers and other network resources. It is important for businesses to automate access to these AD groups with proper approvals and also run certification campaigns…

Okta Device Access macOS TOTP account link

Introduction In Desktop MFA for macOS, admins can now choose between Okta Verify push notification and Okta Verify Time-based One-Time Password as the user verification method used to link an Okta account to the local macOS account.In this blog I will show you how to implement Okta Verify Time-based One-Time Password as the user verification method to…

All You Need To Know About Okta and Google Workspace Integration

This post will illustrate how to integrate Okta and Google workspace, options of integration and how to migrate users or stage the migration, the authentication flows and inbound federation.The post includes videos to illustrate how the integration works. The implementation was done on a small scale and in testing environments. Any production application should be…

Better together: Okta Device Access and Okta FastPass

Introduction Combining security and user experience sometimes seems to be a challenging endeavour.In the last few weeks I have been asked by colleagues but also customers, hey I have now successfully implemented Okta Device Access, where I log on to my end device with a strong factor.But how can I now offer my end users…

Shared device authentication for consumers – device flow and Okta

The article discusses challenges and solutions for shared device authentication, focusing on consumer scenarios. It explores issues like credential exposure, session takeover, and phishing, proposing decoupled authentication and the OAuth 2.0 Device Authorization Grant as effective solutions. The Okta Customer Identity Cloud (Auth0) and Okta Workforce Identity Cloud (WIC) support this approach for secure shared…

Unofficial OIN

What is the “OIN”? The Okta Integration network is a network of integrations that Okta maintains for the different service providers (SaaS applications) that Okta connects with and provides setup documentation for.  There are around 8,000 applications in the Okta Integration Network as I write this article.  When a business wants to check if their…

Token protection (DPoP) with Okta

DPoP brings additional security to accessing both Okta APIs and external APIs. This article outlines the implementation steps to integrate applications with Okta using DPoP to prevent the misuse of authorization tokens.

Something went wrong. Please refresh the page and/or try again.