We all appreciate that a Zero Standing Privileges model is the best approach when it comes to privileged access - if a compromised account doesn't have standing privileges, then the attacker is limited in what they can do. But the reality for many organisations is that there are still shared accounts with elevated privileges that … Continue reading Leveraging Zero Standing Privileges and Shared Account Access with Okta Privileged Access
Okta Privileged Access (OPA) leverages with wider Okta Workforce Identity Cloud capabilities for many use cases. One of these integrations is with the Okta Access Requests components, that comes as part of the Okta Identity Governance (OIG) product, but also ships in a limited form with OPA. This article explores the two common use cases: … Continue reading Okta Privileged Access and Okta Access Requests
A common requirement for access requests is adding a file to support the request. It may not be obvious, but Okta Identity Governance has the means to attach a file to a request. Let's explore this and show an example. How to Attach a File in the Access Requests Portal A file can be attached … Continue reading OIG Access Requests – Can I Attach a File?
My colleague, Rajesh Kumar, showed me something today that fell into the "wow, I didn't even think of using the product this way" category. It involves using logic in Access Request flows (Request Types) in Okta Identity Governance to prompt for additional information based on earlier selections. Let's look at how the user experiences it, … Continue reading OIG Access Requests – Posting Questions Based on Earlier Selections
This article looks at a new approach you could use to perform Separation of Duties (SoD) checking from Okta Access Requests using Okta Workflows. It shows two approaches you could take to get SoD analysis into the request a soon as it's raised so that the reviewer has the information at hand before approving the … Continue reading OIG Access Requests and Workflows – Checking SoD In An Access Request
This article looks at a recent addition to the Okta Identity Governance (OIG) Access Request API that allows updating of in-flight access requests and can be used to add additional data to help reviewers review requests. Overview of the IntegrationAn Example Request With Additional InformationThe Mechanics of the IntegrationNew Requests API CallAccess Request Created Event … Continue reading OIG Access Requests – Posting Additional Information into a Request
For some time there has been the ability to trigger a workflow in Okta Workflows from a request flow in Okta Access Requests via events written to the Okta System Log. Events were created for a request being initiated and being closed. But this approach has some limitations, such as a lot of processing within … Continue reading OIG Access Requests – Calling an Okta Workflow from Within a Request Type
As is often the case, product documentation tells you how to turn on or configure a function but often doesn't provide the context of that function. I found this yesterday when exploring something with a customer in Okta Identity Governance (OIG) Access Requests. What is the Request Assignee you can assign to some of the … Continue reading OIG Access Requests – Who is the Request Assignee?
Recently someone asked if Okta Identity Governance (OIG) Access Requests could be setup so a manager could supply additional information for the request. Their use case, the requester wants access to an application but they don't know the role they need, so the manager would select the role at the approval stage. Short answer - … Continue reading OIG Access Requests – Can an Approver Supply Information for a Request?
If you've seen a demonstration of Okta Identity Governance (OIG) Access Requests, you have probably seen the machine learning (AI) capability when requesting access in Slack or Microsoft Teams. You ask for access to something, and the AI will try to determine the best request type to present. It learns over time, so that terms … Continue reading Did You Know the Machine Learning in OIG Access Requests Extends to the WebUI?