Book Image

Okta Administration: Up and Running

By : Lovisa Stenbäcken Stjernlöf, HenkJan de Vries
Book Image

Okta Administration: Up and Running

By: Lovisa Stenbäcken Stjernlöf, HenkJan de Vries

Overview of this book

IAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you’ll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers. Once you’ve understood how Okta can be used as an IAM platform, you’ll learn about the Universal Directory, which covers how to integrate other directories and applications and set up groups and policies. As you make progress, the book explores Okta’s single sign-on (SSO) feature and multifactor authentication (MFA) solutions. Finally, you will delve into API access management and discover how you can leverage Advanced Server Access for your cloud servers and Okta Access Gateway for your on-premises applications. By the end of this Okta book, you’ll have learned how to implement Okta to enhance your organization's security and be able to use this book as a reference guide for the Okta certification exam.
Table of Contents (13 chapters)
1
Section 1: Getting Started with Okta
8
Section 2: Extending Okta

Exploring Okta

A complete user and system management setup isn't just in one product, nor is it one vendor. A complete view of all sections within and outside of the organization is best done by utilizing different tools.

This combination and their deep integrations make it possible to create a fine-knit layer of security and insights on top of everything, flexible enough to allow exceptions, but strong enough to fight off anything considered harmful to the users, content, data, or organization.

An IAM system can be seen as a collection of different elements and tools to deliver this. It can be considered that the following functionalities are part of, but not limited to, an organization's toolkit:

  • A password vault to store and maintain access to applications and systems. This can be advanced by using protocols that allow Single Sign-On (SSO).
  • Provisioning integrations to create and manage user identities within directories, applications, databases, and...