Book Image

Okta Administration: Up and Running

By : Lovisa Stenbäcken Stjernlöf, HenkJan de Vries
Book Image

Okta Administration: Up and Running

By: Lovisa Stenbäcken Stjernlöf, HenkJan de Vries

Overview of this book

IAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you’ll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers. Once you’ve understood how Okta can be used as an IAM platform, you’ll learn about the Universal Directory, which covers how to integrate other directories and applications and set up groups and policies. As you make progress, the book explores Okta’s single sign-on (SSO) feature and multifactor authentication (MFA) solutions. Finally, you will delve into API access management and discover how you can leverage Advanced Server Access for your cloud servers and Okta Access Gateway for your on-premises applications. By the end of this Okta book, you’ll have learned how to implement Okta to enhance your organization's security and be able to use this book as a reference guide for the Okta certification exam.
Table of Contents (13 chapters)
1
Section 1: Getting Started with Okta
8
Section 2: Extending Okta

Securing a VPN with MFA

VPNs have been one of the standard ways to connect securely to applications and data behind organizational perimeters. As VPNs evolve, so do options to secure them. The credentials to log in can be compromised, and having additional security allows outside threats to be thwarted and secures what is usually most critical and sensitive behind the VPN.

Different VPNs' software and vendors deliver different types of integrations. Some might allow SSO to be set up, while others use directories such as Active Direcory or LDAP, and perhaps even RADIUS. In any of these methods, you can use Okta's login credentials to be the only set of credentials the user has and add MFA to the login process.

As we spoke about earlier in this chapter, we can utilize at least two categories in securing access: something we know and something we have, and perhaps even something we are.

Depending on the type of VPN software running, the client of the user might be able...