Workflows

Okta Workflows (https://www.okta.com/au/platform/workflows/) makes it easy to automate identity processes at scale – without writing code. Use if-this-then-that logic, Okta’s pre-built connector library, and the ability to connect to any publicly available API to enable anyone to innovate with Okta.

Okta Workflows can be used in many identity use cases, covering workforce, IGA/PAM and consumer IAM. It fills the gap where out-of-the-box functionality can’t address a need, and an obvious area for blog articles. A lot of great information, like how-to guides, can be found in the help documentation: https://help.okta.com/wf/en-us/Content/Topics/Workflows/workflows-main.htm.

Also, there’s some brilliant material on https://maxkatz.net/ (Max is part of the Okta Product Acceleration Team focusing on Okta Workflows).

This page links to all the Workflows articles on this site.

Workflow Samples

Workflow samples available for download.

NoDescriptionLink
1Sychronize User Status from Okta to Auth0Download
2Using Workflows to retrieve Slack user status and other info using Custom API cardsDownload
3Advanced Server Access Pre-authorizationsDownload
4Identity Governance Separation of DutiesDownload
5Identity Governance Continuous CertificationDownload
6Identity Governance Fine-grained Permission ReportingDownload
7Identity Governance Inactive UsersDownload
8Okta Access Gateway and Access Requests Syslog ReportingDownload
9Office 365 / Azure AD seemless Users and Password’s Migration to OktaDownload
10Microsoft Office 365 Guest users’ lifecycle management with Okta WorkflowsDownload
11This workflow is designed to sync Office 365 Attributes to OktaDownload
12Certifying Access for Disconnected Application in OktaDownload
13User Provisioning for Manage Engine via Okta WorkflowsDownload
14This workflow demonstrates how a user’s profile can be enriched with associated values that have been retrieved from an external tableDownload
15This workflow provides the ability for the user to suspend and reactivate their Okta enrolled devices via SlackDownload
16Cursor based pagination example using the MS Graph APIDownload
17Provision Users from Auth0 to OktaDownload

Okta Workflows How-To: Anything as a Source

Okta customers, particularly in the Workforce Identity space, are looking to model and, where possible, automate the IT processes associated with individuals joining, moving within, or leaving their organization. These processes are driven by changes to data in an organization’s source of truth for identity information. The driving forces behind automation include improving IT efficiency,…

Bring Your Own Messaging Provider: WhatsApp OTP with Inline Hooks & Workflows

Okta’s Identity Engine introduced an Inline Hook for Telephony effectively allow you to replace Okta’s inbuilt SMS solution with your own provider. This empowers customers to manage their own numbers and providers around the world allowing for cost and delivery optimisation. It also paves the way for adding additional channel options for OTP messages. Messaging…

Understanding AWS IAM and Integrating with Okta and Workflows

I’ve been looking into application entitlements and the Amazon Web Services (AWS) users, groups and entitlements has perplexed me for some time. I’ve had the opportunity to explore it, try to understand it and build some integration between Okta Workforce Identity Cloud (via Okta Workflows). This post is a summary of my findings. AWS and…

New in Workflows: Security Operations Solution Packs

Okta Workflows has just released a number of templates focused on Security Operations Centre (SOC) processes. These Workflow templates are designed to help solve specific identity-based automation challenges for the Security Operations team using a bundled collection of pre-built and fully customizable flows. The categories include: Some of the main benefits are: To find all…

Learn How to use Workflows for Inline Hooks

With this release of low-latency flows, Okta has laid the groundwork for supporting any web hook that is time sensitive. Traditionally, organizations have to spend engineering effort to build, deploy, host, and manage their own system in order to enrich a user’s profile (token or session), or notify/remediate a security threat. Those systems become even…

Low Latency Flows

Okta Workflows doesn’t guarantee execution latency. Usually flows run very fast. However, Workflows is a multi-tenant system and doesn’t have a latency SLA. Flows execution times depend on: Because specific latency can’t be guaranteed, up until now, Workflows shouldn’t be used in any flows where execution time is critical to the scenario, such as token…

Fixed Recovery Questions with Workflows

Recently an Okta customer was interested in being able to set a fixed Recovery Question for a subset of its employees. In particular they wanted to use an attribute from their source of truth as a security answer. Having a fixed security question and answer based on an employee attribute does have security drawbacks however…

Okta Identity Governance and/or Service Now – Architectural Patterns

Most organisations have some ITSM or service request tool, and ServiceNow is the most common. So it’s understandable that any conversation about Okta Identity Governance, particularly access requests, will involve comparison with ServiceNow or integration patterns for both products. How do you approach an access request solution? Which product is going to meet your needs…

Risk-Based Application Certification in OIG

If you were at Oktane22, or have listened to the Oktane22 roadmap sessions, you will know risk and use of risk signals is a key focus for Okta going forward. This includes leveraging risk in Okta Identity Governance (OIG), to help make access requests and access certification more effective. But can you leverage risk today?…

Logging a ServiceNow Request via Workflows from OIG Access Requests

A common ask for Okta Identity Governance is to be able to log at ticket in a service desk tool, like ServiceNow, for manual provisioning activities after following an approval process in Access Requests. This article explores one approach to this using OIG Access Request events in the Okta System Log, Event Hooks and Okta…

Loading…

Something went wrong. Please refresh the page and/or try again.