Everything Identity and Access Management leveraging OKTA technology
Workflows
Okta Workflows (https://www.okta.com/au/platform/workflows/) makes it easy to automate identity processes at scale – without writing code. Use if-this-then-that logic, Okta’s pre-built connector library, and the ability to connect to any publicly available API to enable anyone to innovate with Okta.
Okta Workflows can be used in many identity use cases, covering workforce, IGA/PAM and consumer IAM. It fills the gap where out-of-the-box functionality can’t address a need, and an obvious area for blog articles. A lot of great information, like how-to guides, can be found in the help documentation: https://help.okta.com/wf/en-us/Content/Topics/Workflows/workflows-main.htm.
Also, there’s some brilliant material on https://maxkatz.net/ (Max is part of the Okta Product Acceleration Team focusing on Okta Workflows).
This page links to all the Workflows articles on this site.
In May 2025 Okta released a Workflows connector for Identity Threat Protection with Okta AI, called the Okta ITP connector. This article is a brief walkthrough of the connector. Introduction With the release of Identity Threat Protection with Okta AI (ITP), new capabilities have been added to the Okta Workforce Identity platform for risk evaluation/detection…
Identity Threat Protection with Okta AI will continuously assess user context and automatically respond to identity threats across your ecosystem. This includes managing entity (user) risk levels. Okta Privileged Access does not explicitly have user risk built in, but user risk can be applied to control how users access privileged resources. This article looks at…
In a recent engagement a customer raised issues around management of secrets and folder,s and associated policies and users in their Okta Privileged Access (OPA) deployment. In the spirit of the mantra of Mr Bigweld in Robots “see a need, fill a need”, I set about writing some utilities to help manage larger, more-complex Secrets…
If you have been working with applications in Okta for some time and occasionally use the APIs (or Workflows) you would be aware that one glaring omission in the API library was an API to manage the Push Groups on applications. This has now been addressed with the Group Push Mapping API. The Group Push…
BONUS: Tako can also has access to SPECIAL TOOLS (ex: can user access app) as shown in the image below which answers the question which Okta admins get the most!
Introduction In today’s rapidly evolving threat landscape, identity is the new security perimeter. Organizations face sophisticated cyber threats that target user credentials, exploit access gaps, and challenge traditional security measures. To stay ahead, IT and security teams need a proactive, intelligent approach to identity protection—one that not only detects threats but also responds in real…
This document describes the approach and mechanism to authorize users to access Okta Privileged Access (OPA) and protected resources. Introduction This document outlines a solution for managing access for federated users, specifically from business partners, vendors, subsidiaries, or sister companies, to applications and resources protected by Okta Privileged Access. This document focuses on addressing business…
Auth0 Forms is a tool designed to allow identity flows to be extended with customisable forms and logic, allowing use cases like progressive profiling, policy acceptance, payment collection and more within the hosted login flows you’ve come to know and love from Auth0. For more detail on forms please refer to my earlier post Auth0…
Auth0 Forms is a powerful tool to extend identity flows with customisable forms and business logic. Forms allows for a hosted secure experience with no need to redirect users to external sites and consistent branding with Universal Login. In this blog post I will talk through how to use forms to ensure all your application…
Auth0 has launched native support for Global Token Revocation and Okta’s Universal Logout functionality. This means that Auth0 applications now natively support the ability for federated Okta customers to automatically revoke all of the users sessions and tokens when Identity Threat Protection detects malicious or suspicious behaviour. Now, Auth0 powered applications can offer the same…