With Auth0 (Okta Customer Identity Cloud), get ready for Action !

Actions in the Login flow in Auth0 Let’s discover Actions, those pieces of code that act as flexible extensions to the authorization and authentication flow! For starters, what’s Auth0 ? Auth0 is an IaaS (Identity as a Service) solution, designed by and for developers. Acquired by Okta in 2021, Auth0 will become the solution for CIAM (Customer … Continue reading With Auth0 (Okta Customer Identity Cloud), get ready for Action !

Okta API Access Management: a Dark Knight metaphor

Recently, while thinking about what topic I should select for a new article, my gaze stopped on my desk. As often, a Batman comic was next to my right screen (for those who wonder, it was "Gotham Nocturne"). Then came to me a very geeky idea : if I were to explain some Okta concepts … Continue reading Okta API Access Management: a Dark Knight metaphor

OKTA Workflows : the best is yet to come

In my previous article, I gave you a brief introduction to Okta workflows, in order to arouse your curiosity as to the potential of this tool. On the face of it, if you’re here, that’s the case (if you’ve seen the light and gone in, that’s good too!). Today, I’m going to take the presentation … Continue reading OKTA Workflows : the best is yet to come

Introduction to OKTA Workflows: nothing is impossible (almost)!

A test workflow from one of our tenants If you’re here, you probably know what Okta is. But if you don’t, we won’t hold it against you (promise!). Okta offers an IAM (Identity Access Management) solution, enabling you to centrally and securely manage your users’ identities and access to the resources they need to access. … Continue reading Introduction to OKTA Workflows: nothing is impossible (almost)!

A Single Source of Truth – Okta as a Whole of Business Identity Solution, Part 1

Introduction Over the last several years, an increasing number of organisations have begun to question the business value delivered by their continued use of on premise directory services, such as Active Directory. As a group of products, many on premise directory services do what they do exceptionally well, assuming they are well managed and you … Continue reading A Single Source of Truth – Okta as a Whole of Business Identity Solution, Part 1

Fixed Recovery Questions with Workflows

Recently an Okta customer was interested in being able to set a fixed Recovery Question for a subset of its employees. In particular they wanted to use an attribute from their source of truth as a security answer. Having a fixed security question and answer based on an employee attribute does have security drawbacks however … Continue reading Fixed Recovery Questions with Workflows

Search Okta System logs and upload logs into a REST endpoint

Okta Workflows makes it easy to automate identity processes at scale – without writing code. Use if-this-then-that logic, Okta’s pre-built connector library, and the ability to connect to any publicly available API to enable anyone to innovate with Okta. Workflows templates provide flow builders with pre-built, configurable flows for common identity automation use cases. Flogrammers can … Continue reading Search Okta System logs and upload logs into a REST endpoint

Choosing Specific Factors in OIE with the API

Okta Identity Engine provides increased flexibility for Authentication with Application Level Policies and easy to configure passwordless sign-in experiences. These are covered extensively in our deployment guides: Authentication policies deployment guide and Passwordless authentication deployment guide. It also provides a simplified administrator experience by moving from Factor sequencing to Assurance Models. This new experience is simple … Continue reading Choosing Specific Factors in OIE with the API

A Look at IAM in Red Hat Enterprise Linux

This is a trimmed down version of an article I published on LinkedIn on Jun 11, 2020 (https://www.linkedin.com/pulse/look-iam-red-hat-enterprise-linux-david-edwards-iamdavid-/). For a recent engagement I had to 'page back in' long-forgotten aspects of identity and access management (IAM) for Unix/Linux, specifically the Red Hat Enterprise Linux (RHEL) operating system. I couldn’t find a comprehensive guide to all … Continue reading A Look at IAM in Red Hat Enterprise Linux

IGA & RACF – How Effectively Can You Manage the Risk of Mainframe Users?

This article was originally posted on LinkedIn on 29 August, 2019 (https://www.linkedin.com/pulse/iga-racf-how-effectively-can-you-manage-risk-users-david/). Way back in the late 80’s I was a trainee programmer learning all things green-screen, like ISPF, JCL, CICS and Cobol. Colleagues laughed, asking me why I was bothering given the mainframe would be gone in five years. Here we are thirty years … Continue reading IGA & RACF – How Effectively Can You Manage the Risk of Mainframe Users?