<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.okta.com/">
  <channel>
    <title>Blog</title>
    <link>/resources/events/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>The Salesloft incident: A wake-up call for SaaS security and IPSIE adoption</title>
  <link>https://www.okta.com/blog/2025/09/the-salesloft-incident-a-wake-up-call-for-saas-security-and-ipsie-adoption/</link>
  <description>&lt;span&gt;The Salesloft incident: A wake-up call for SaaS security and IPSIE adoption&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Tue, 09/02/2025 - 11:06&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;A recent security incident involving the compromise of Salesloft Drift, a popular marketing automation tool, has affected a large number of organizations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;During this event, threat actors stole and replayed the OAuth tokens that connect the Drift tool to Salesforce, Google Workspace and many other applications, leading to widespread exfiltration of data. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This incident has impacted many of our technology peers. These events naturally raise questions for our customers and partners: "Was Okta impacted?" and "What is Okta doing to protect our data?"&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We want to be crystal clear: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Okta was not impacted by this incident.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Our security team thoroughly investigated our systems and confirmed that while we observed evidence of attempts to access our resources using stolen tokens, our defenses worked as designed to prevent a breach.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Defense in practice: The impact of a single control&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;When our team learned of the Salesloft Drift compromise, we immediately reviewed our logs. We discovered attempts to use a compromised Salesloft Drift token to access an Okta Salesforce instance. These attempts failed. When we later compared these attempts to the Indicators of Compromise (IOCs) from the&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Google Mandiant blog post&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, the data confirmed that we were indeed a target.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The single most important control that prevented this breach was our &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;enforcement of inbound IP restrictions&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;. The threat actor attempted to use a compromised token to access our Salesforce instance, but the attack failed because the connection originated from an unauthorized IP address. This security layer proved essential, blocking the unauthorized attempt at the front door before any access could be gained.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Our security strategy is to apply this fundamental control to all of our SaaS applications. However, our ability to implement this is often limited, as it's entirely dependent on whether the SaaS vendor provides this capability. Unfortunately, many providers in the cloud-first world do not offer this foundational security feature, creating a significant challenge for protecting interconnected systems.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;For an application as critical as Salesforce, which does support this feature, we undertook the significant effort required to configure these restrictions for both APIs and users. This deliberate investment, made as part of the Okta Secure Identity Commitment, included the work to ensure all Okta employees use a cloud-based VPN with private IP exit nodes to create a trusted corporate network. This foundational step ensures that for our most vital applications that support this feature, we can enforce the network-level security necessary to defend against this type of attack.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Beyond IP restrictions: Securing tokens with DPoP&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Another pillar of the Okta Secure Identity Commitment was to create market-leading, secure identity products and services. As a result of that commitment, both Auth0 and Okta built support for Demonstrating Proof of Possession (DPoP) for application developers using our services.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Where IP allowlisting constrains the use of a token by IP, DPoP can constrain the use of a token to a specific client. This security mechanism cryptographically binds an access token to the specific client that requested it. In simple terms, it's like a key that is uniquely paired with its lock. Even if an attacker stole the key (the token), they couldn't use it because it wouldn't work on their own machine (the wrong lock). This control prevents the replay of stolen tokens, which was the central issue in this supply chain attack.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Building a resilient SaaS ecosystem with IPSIE&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This incident is a stark reminder that a breach of one service can have a ripple effect across today's interconnected SaaS ecosystem. To defend against this, we must move beyond securing applications individually and ensure they are all part of a unified identity security fabric. Such a fabric, built on open standards, is what allows organizations to detect and respond to identity-based threats with the required speed and scale.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This is why, almost a year ago, Okta announced our commitment to driving a new industry standard called the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Interoperability Profile for Secure Identity in the Enterprise (IPSIE)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; in partnership with other members of the OpenID Foundation. IPSIE aims to create a baseline for security and interoperability across SaaS applications.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Two of the fundamental controls that are part of the IPSIE framework are particularly relevant to the Salesloft Drift incident:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Shared Signals:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; This allows for real-time communication of security events between applications. For example, if a user's account is compromised in one application, that information can be instantly shared with all other connected applications, which can then take action to protect the user's data.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Token Revocation:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; This provides a standardized way to revoke access tokens. In the case of the Salesloft Drift incident, if a token was known to be compromised, it could be instantly revoked across all integrated applications, severing the attacker's access.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;These are just a few examples of the many ways that IPSIE helps to create a more secure and resilient SaaS ecosystem.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;A call to action for the SaaS industry&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The Salesloft Drift incident is a wake-up call for the entire SaaS industry. We can no longer afford to operate in silos. We must work together to establish and adopt a common set of security standards.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The future of SaaS security is already here, it's just not evenly distributed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We urge all SaaS companies to join us in supporting the IPSIE initiative. By working together, we can make the entire SaaS ecosystem safer for everyone.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;What you can do to protect your organization&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This isn't just a problem for vendors to solve; all organizations have a critical role to play in raising the bar for the entire ecosystem. Here’s how you can act now:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Demand IPSIE from your vendors.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; The security of the interconnected SaaS landscape is a shared responsibility. As a customer, your voice is the most powerful driver of change. Ask your vendors about their roadmap for adopting open standards like IPSIE. When providers know that security and interoperability are key purchasing criteria, they will prioritize them. Your demand is what will turn these standards from a good idea into an industry-wide reality.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Implement an identity security fabric.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; While we push for better industry-wide standards, it is imperative that you act to secure your own digital environment. The days of treating identity on an app-by-app basis are over. By implementing a unified identity security fabric, you can weave together access control, threat detection and response, and governance across all your applications and identity types. This provides a single, consistent layer of defense, allowing you to proactively secure your organization from the inside out.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;To learn more about IPSIE, please visit the&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://openid.net/wg/ipsie/"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;OpenID Foundation website&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/saas-security/" hreflang="en"&gt;Saas Security&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/ipsie/" hreflang="en"&gt;IPSIE&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/data-breach/" hreflang="en"&gt;data breach&lt;/a&gt;
  Okta Security
</description>
  <pubDate>Tue, 02 Sep 2025 18:06:49 +0000</pubDate>
    <dc:creator>Okta Security</dc:creator>
    <guid isPermaLink="false">43785 at https://www.okta.com</guid>
    </item>
<item>
  <title>Building AI-ready identity security with Okta Identity Security Posture Management</title>
  <link>https://www.okta.com/blog/2025/08/building-ai-ready-identity-security-with-okta-identity-security-posture-management/</link>
  <description>&lt;span&gt;Building AI-ready identity security with Okta Identity Security Posture Management&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Fri, 08/29/2025 - 19:00&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;When machines inherit dangerous permissions&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It's 3 a.m., and an AI agent is negotiating between your Salesforce instance, AWS infrastructure, and ServiceNow workflows. The agent operates tirelessly, making thousands of decisions per minute. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;But here's what should terrify you: This AI agent isn't using its own credentials. It's borrowing the identity of an application — and that identity might have permissions that could compromise your entire organization.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Welcome to the world of workload app identities, where the promise of autonomous business operations collides with a security reality most organizations aren't prepared for.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;The new identity landscape&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;As we explored in our recent blog on the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/blog/2025/02/non-human-and-human-identities-a-unified-approach/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;convergence of human and non-human identities&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; (NHIs), organizations have begun addressing traditional&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;service accounts and API keys. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Workload identities&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; represent the next evolution in this challenge. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Unlike traditional service accounts that rely on human-born users with static passwords, workload app identities use modern, token-based authentication (usually OAuth or certificates) with fine-grained permissions that are not tied to a human user's lifecycle and are purpose-built for automation. In theory, that makes them perfect for our AI-powered future. In practice? They've become the most overlooked attack surface in your environment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Modern enterprises run on workload identities, those critical authentication mechanisms that allow applications to connect securely. Examples include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Entra ID&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; service principals and registered apps&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Salesforce&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; connected and external apps&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Google &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;custom apps and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;GCP&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; service accounts&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;AWS &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;IAM roles&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Okta Integration Network&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; apps and custom app integrations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;GitHub &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;OAuth apps&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Snowflake &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;OAuth integrations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt; &lt;/p&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1640" height="861" alt="Evolution of identities" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/Screenshot%202025-08-28%20at%205.12.29%E2%80%AFPM_0.png?itok=f9tqwutB" class="lazyload" /&gt;&lt;/article&gt;&lt;h2&gt;
&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;The AI agent inheritance problem&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;When AI agents and MCP Servers interact with your applications, they inherit that application's workload identity permissions. The app's identity dictates the maximum scope of what an AI agent can do autonomously.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;This creates unprecedented risks:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;1. Highly privileged identities: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Admin-level access granted during "just make it work" moments becomes a permanent backdoor for attackers — with far less visibility than human breaches.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;2. Unused privileges: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;That OAuth app from a six-month-old POC? Still active, still has privileged production access, still a door any compromised system could walk through.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;3&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Toxic privileges combinations and segregation of duties:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Individually reasonable permissions become dangerous combinations when inherited by autonomous systems operating at machine speed. Real scenarios keeping security teams awake:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;A GitHub app with read access to private repos AND write access to production. A single identity holds the power to steal valuable IP and directly attack and compromise the live, customer-facing product&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;An AWS role with write/delete privileges on dev AND production. A compromise in the less-secure dev environment can then directly impact the critical production environment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;A Salesforce connected app accessing customer data AND modifying security settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;An attacker who compromises this one identity gets the keys to the kingdom: They can steal data and cover their tracks by disabling audit logs or other security features.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;4. Unrotated secrets: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Without automated rotation, credentials become permanent. An AI agent could make thousands of API calls with tokens that should have expired months ago.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;5. Missing network controls: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Workload identities lack IP restrictions, exposing your systems to being accessed from anywhere, making it easier for malicious actors, and you'd never know.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;6. Misconfigured trust: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Overly broad trust relationships create attack paths that machines can exploit faster than humans can detect.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;The Okta Identity Security Posture Management advantage&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta ISPM provides the foundation for securing the entire identity perimeter, including human, non-human, and agentic identities as they become more prevalent across your technology stack. Whether it's a Salesforce admin service account with a password, a GitHub OAuth app, an AWS IAM user with an API key, or an Okta Admin with a token, Identity Security Posture Management gives you the visibility and control to manage these powerful permissions before they’re exploited.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Cover your most critical apps — including IdPs, SaaS, and Cloud infrastructure: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Unlike tools focused on infrastructure or individual applications, Okta Identity Security Posture Management provides comprehensive discovery and management across your identity landscape.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Cover the most critical NHI types: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta Identity Security Posture Management supports a wide range of NHIs, from legacy service accounts, through API keys and tokens, to modern OAuth apps and Salesforce AI Agents.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Work on scale: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta Identity Security Posture Management automatically discovers and classifies NHIs across your environment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;The path forward: Future-ready for AI agents and NHIs&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Every workload identity is a potential superpower — or vulnerability — for AI agents and automated systems. The question isn't whether you need a comprehensive identity security strategy. It's whether you'll implement it before your first AI agent incident.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;In a world where AI agents make autonomous decisions through inherited identities, identity security isn't just about protection — it's about enabling your business' AI-powered future. Okta Identity Security Posture Management gives you the visibility and control to embrace AI agents confidently, starting with comprehensive identity discovery and management across your entire environment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Because the organizations that solve the workload identity crisis won't just survive the AI revolution — they'll define it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Ready to secure your workload identities? &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/identity-security-posture-management/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Discover how Okta Identity Security Posture Management&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; helps leading organizations protect their autonomous future.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/okta-identity-security-posture-management/" hreflang="en"&gt;Okta Identity Security Posture Management&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/ai/" hreflang="en"&gt;AI&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/company-product/" hreflang="en"&gt;Company + Product&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/johnathan-campos/"&gt;Johnathan Campos&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/johnathan-campos/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Johnathan Campos&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Product Marketing Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Johnathan Campos, originally from Miami, FL, is based in Miramar, FL, a southern suburb of Fort Lauderdale.&lt;/p&gt;
&lt;p&gt;Before his career as a Product Marketing Manager, he was a DevOps/ITOps engineer for Citrix and several other healthcare organizations, where he developed a wealth of knowledge in Cloud and DevOps culture. Prior to Okta, he was part of the product organization as a PMM for the Observability product suite at Splunk, where he focused on GTM strategies and developer advocacy. Before that, he was part of the product organization at Citrix as a PMM for Citrix Endpoint Management, where he focused on GTM strategies, customer adoption, and field enablement. &lt;/p&gt;
&lt;p&gt;Outside of work, he enjoys riding his motorcycle, spending time in the garage, learning new things (especially cool new tech), and spending time with family and friends.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/lior-tamir/"&gt;Lior Tamir&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" lang="jp" about="https://www.okta.com/jp/blog/author/lior-tamir/" xml:lang="jp"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Lior Tamir&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  シニアプロダクトマネージャー
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Okta Identity Security Posture Managementのプロダクト管理およびデザインチームを統括。サイバーセキュリティ分野での豊富な経験を持ち、Oktaによる製品買収以前は、MicrosoftにてSOC関連のインシデント検知・調査・対応に取り組む。&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Sat, 30 Aug 2025 02:00:00 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43742 at https://www.okta.com</guid>
    </item>
<item>
  <title>Oktane 2025 preview: Identity security as the public sector’s AI-ready control plane</title>
  <link>https://www.okta.com/blog/2025/08/oktane-2025-preview-identity-security-as-the-public-sectors-ai-ready-control-plane/</link>
  <description>&lt;span&gt;Oktane 2025 preview: Identity security as the public sector’s AI-ready control plane&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Wed, 08/27/2025 - 17:16&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;AI is rewriting how every industry, including the public sector, works — from how residents discover services to how adversaries craft attacks. In that shift, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;identity&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; has become the control plane that personalizes interactions, enforces policies, and makes new AI capabilities safe to use.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;At &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/oktane/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Oktane 2025&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, our public-sector sessions will be built to help leaders and practitioners turn that idea into action. You’ll hear how a state is unifying millions of resident identities, how global integrators run identity as a shared service, how universities are modernizing decades-old stacks, and how security leaders are countering AI-powered threats with identity-first defenses.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;If you work within the U.S. government or education ecosystem, this is your playbook.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Four big questions we’ll answer at Oktane&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;1) How do you make identity the foundation for modern resident and workforce experiences?&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Session: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;The Public Sector CIO’s Playbook on Identity, Security, and Cultural Change in the Age of AI&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;CIOs across the public sector are reshaping service delivery around a unified identity platform — not just to simplify logins, but to build a durable security layer and a business-led culture of transformation. Expect candid lessons from a top public sector leader on aligning policy and technology, sequencing modernization without service disruption, and measuring outcomes that matter to residents. Moderated by &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;former Arizona CIO and Executive Government Advisor at AWS, Morgan Reed&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;2) What does identity-as-a-shared-service look like in the real world?&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Session:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;Identity challenges in an enterprise shared service model&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Running identity for complex, regulated enterprises is hard — especially when you’re integrating acquisitions, meeting global mandates, and hardening against evolving threats. Leaders from &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Huntington Ingalls Industries (Chris Soong, CIO)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Leidos (J.R. Williamson, CISO)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;ManTech (Mike Uster, CIO/CTO)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; will compare operating models, governance patterns, and the “gotchas” they wish they’d known earlier. Bring your toughest questions. Moderated by &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Okta’s VP of Federal, Amy Johanek&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;3) How are higher education institutions leaping from legacy to leading edge?&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Session: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;From legacy to leading edge: Identity transformation journeys in higher education&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Identity leaders from higher education institutions, including &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Harvard (Gretchen Gingo),&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; will share how they moved from aging stacks to modern platforms — and what it took organizationally to get there. You’ll hear how identity can streamline student journeys, secure research, and unlock responsible AI on campus. Moderated by &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Okta’s Chief Security Officer, Sean Frazier&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;4) How do you defend when attackers have AI, too?&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Session: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;Rethinking defense for the AI-Powered threat landscape&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Deepfakes, convincing phishing at scale, and credential abuse are changing the game. Executives from &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;AWS (Maria Thompson)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Zscaler (Adam Ford)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;CrowdStrike (Karan Sondhi)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; will walk through identity-centric, Zero Trust moves that actually blunt today’s attacks — think phishing-resistant authentication, continuous risk signals, and policy automation that meets people where they are. Moderated by &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Okta’s AVP of Public Sector and Strategic Alliances, Ralph Figueiredo&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Don’t miss the opening keynote with Todd McKinnon&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Our headlining keynote, from Okta co-founder and CEO &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Todd McKinnon, &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;will set the tone for the event. Todd will share his view of how organizations can &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;maintain a strong security posture while investing in AI-driven transformation&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, provide updates on the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Okta Secure Identity Commitment (OSIC)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, and outline Okta’s vision for an &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;identity security fabric&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; that connects people, devices, apps, and AI services. He’ll also preview &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;product announcements&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; that help teams accelerate innovation with confidence.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;What you’ll take back to your team&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;A clear definition of an AI-ready identity:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; You’ll leave with a shared language for what “AI-ready” means — how identity underpins secure AI use cases, data access, and governance — plus where to start and how to measure progress.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;A north-star architecture for identity as critical infrastructure:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; See how a unified identity layer spans people and non-human access, applies adaptive policy, and plugs into your existing stack using open standards.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Scalable change patterns:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Learn proven governance rhythms, funding models, and rollout sequences that work across agencies, campuses, and partners — so progress isn’t tied to any one tool or team.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Confidence to act:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Ground your roadmap in cross-sector lessons and the latest capabilities, with practical frameworks you can adapt to your mission and risk profile.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Who should attend&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Agency and campus leaders&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; driving digital service, CX, and transformation programs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;CIOs, CISOs, and architects&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; building Zero Trust and AI governance roadmaps&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Practitioners&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; who want real implementation detail — from directory migrations to policy design and incident response&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Why Oktane&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta’s public-sector track brings together government leaders, higher-ed innovators, security strategists, and integrators operating at a national scale. It’s a rare, cross-sector conversation where you can validate your roadmap, compare notes with peers, and leave with an execution plan that prioritizes &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;security&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; and is &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;human-centered&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Join us at Oktane 2025&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; to see how identity becomes your agency’s control plane for the AI era — so you can deliver mission outcomes faster and defend them better.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;Ready to go?&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/oktane/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Register for Oktane 2025&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; and bring your team.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/oktane/" hreflang="en"&gt;oktane&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/ai/" hreflang="en"&gt;AI&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/public-sector/" hreflang="en"&gt;public sector&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/industry-insight/" hreflang="en"&gt;Industry Insight&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/daniel-watts/"&gt;Daniel Watts&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/daniel-watts/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Daniel Watts&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Product Marketing Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;As Okta's SLED Industry Product Marketing Manager, Daniel Watts develops strategic messaging that showcases how Identity solutions can address the unique challenges facing state and local government and educational institutions. With a deep background in the GovTech space, Daniel translates complex Identity technologies into clear strategies that support digital modernization initiatives across the public sector. His work helps technology leaders implement solutions that improve workforce, citizen, and student experiences while building trust in government and educational services.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Thu, 28 Aug 2025 00:16:01 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43691 at https://www.okta.com</guid>
    </item>
<item>
  <title>The next chapter for Okta Privileged Access: Integrating Axiom to accelerate our roadmap</title>
  <link>https://www.okta.com/blog/2025/08/the-next-chapter-for-okta-privileged-access-integrating-axiom-to-accelerate-our/</link>
  <description>&lt;span&gt;The next chapter for Okta Privileged Access: Integrating Axiom to accelerate our roadmap&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Wed, 08/27/2025 - 11:39&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We recently announced something exciting: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/newsroom/press-releases/okta-with-axiom-security--delivering-robust-privileged-access-fo/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta &lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;signed&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; a definitive agreement to acquire &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://axiom.security/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Axiom Security&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, a modern, identity-centric privileged access management (PAM) solution. Our teams plan to integrate key Axiom functionality into &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/privileged-access/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta Privileged Access&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; over the coming months, which will allow us to expand access controls to more sensitive resources for Okta customers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta Privileged Access is and will continue to be the single control plane for our customers’ privileged resources, whether on-premises or in the cloud, streamlining access and governance while eliminating standing privileges. Below, we answer some questions current customers might have.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;What’s changing?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We’re excited to welcome new team members to help us build the leading neutral and independent identity platform. We believe Axiom and Okta Privileged Access complement each other in their approach to providing a modern PAM solution. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Both solutions help organizations unify access to critical infrastructure through centralized policy controls and full traceability to tie access back to an individual. Over the coming months, Axiom will be integrated into the Okta Privileged Access product,  expanding capabilities available to existing customers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why Axiom?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It’s simple: Axiom allows us to deepen functionality and increase value to our customers&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Today, Okta Privileged Access supports passwordless, just-in-time access for Windows and Linux servers, a vault for privileged accounts (server local, SaaS service, Okta, and Active Directory), secrets management, and governance and auditing. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This acquisition allows us to accelerate our roadmap for expanded functionality around just-in-time access for databases and Kubernetes, while maintaining velocity on delivering other core functionality, such as &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/blog/2025/04/securing-privileged-active-directory-accounts-with-okta/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;support for Active Directory accounts&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;What are the benefits for Okta Privileged Access customers?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This acquisition will help Okta customers extend their &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/identity-101/identity-fabric-the-future-of-identity-and-access-management/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;identity security fabric&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; to more privileged accounts and resources, providing a single control plane for managing privileged access, whether on-prem or in the cloud. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Just-in-time access:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Eliminate standing privileges by providing automated, time-limited access only when needed. This reduces risk and operational overhead by helping ensure that elevated permissions are temporary and auditable.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Unified control:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Gain a single point of administration for privileged access across resources. This simplifies management and provides a holistic view of your security posture across on-premises and multi-cloud infrastructure, including critical resources like databases and Kubernetes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Deep coverage:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Secure access to a broader range of critical resources. With new connectors and an AI-based application connector builder, the solution extends security to databases and Kubernetes environments, helping ensure least-privileged access and full traceability for auditing and compliance.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;How much will it cost?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta Privileged Access will continue to be available under its current pricing model, based on resource units. Today, it’s available as part of our Okta Platform Suites or through stand-alone licensing. The functionality gained through this acquisition will be delivered as an enhancement to the existing product, which means customers will benefit without needing to purchase a separate product.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Our flexible resource unit licensing model will remain the same. Customers purchase a pool of &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://support.okta.com/help/s/product-subscription-reference-guide?language=en_US&amp;_gl=1*1j8t4pk*_gcl_au*MTk4MTAxODY4Ny4xNzU0MzQzOTUxLjk2MzU1Mzk2NS4xNzU0MzQzOTUzLjE3NTQzNDM5ODk.*_ga*MTk5MTMxMjM1MS4xNjk4NDI0NzI1*_ga_QKMSDV5369*czE3NTYxNDA3NTMkbzQ0NCRnMSR0MTc1NjE0MDc1OCRqNTUkbDAkaDA." rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;resources units &lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;that can be applied to any combination of resources. This allows you to use your existing units to protect servers, users, service accounts, Active Directory accounts, and soon databases and Kubernetes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;As we integrate the technology into our roadmap, we’ll share more details on pricing, particularly for databases and Kubernetes. Our goal is to keep pricing straightforward and aligned with the value customers get from securing their privileged resources.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why choose Okta for privileged access?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;In today's dynamic, multi-cloud environment, managing privileged access is more complex than ever. Manual processes for permissions lead to security risks, compliance gaps, and operational inefficiencies, especially with the rise of &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/blog/2025/02/non-human-and-human-identities-a-unified-approach/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;non-human identities&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; like AI agents. At this scale, siloed solutions and fragmented identity won’t work.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We hear from customers that this is true even when the products come from a single vendor. A unified contract is not the same as a unified platform. A collection of acquired tools without a unified view is a different kind of fragmentation, and it doesn’t make security or IT’s jobs any easie&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;r.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This is one of the key reasons organizations need to adopt an identity security fabric — a complete set of identity tools orchestrated up and down your tech stack to detect, prevent, and respond to identity attacks quickly. Orchestration is imperative. This allows organizations to leverage risk signal sharing to take real-time action when needed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1640" height="930" alt="Okta Identity Security Fabric" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/Screenshot%202025-08-27%20at%201.38.30%E2%80%AFPM.png?itok=k-tFCmO-" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;PAM is an integral part of an identity security fabric. Axiom will strengthen our existing PAM solution by broadening our reach into critical infrastructure resources, specifically databases and Kubernetes, which are highly privileged, valuable, and requested by today’s Okta customers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;If you have additional questions or want to learn more about Okta Privileged Access, reach out to your Okta representative.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/okta-privileged-access/" hreflang="en"&gt;Okta Privileged Access&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/privileged-access-management/" hreflang="en"&gt;Privileged Access Management&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/identity-security/" hreflang="en"&gt;Identity security&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/company-product/" hreflang="en"&gt;Company + Product&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/elizabeth-baier/"&gt;Elizabeth Baier&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/elizabeth-baier/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Elizabeth Baier&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Senior Product Marketing Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Elizabeth Baier is a Senior Product Marketing Manager at Okta. In this role, Elizabeth is responsible for go-to-market strategy for Okta Privileged Access — a PAM solution for modern infrastructure and the newest addition to Okta Workforce Identity Cloud. She has over 10 years of cybersecurity experience and previously worked in areas of PKI, IoT, secrets management, operational technology, and industrial control systems.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Wed, 27 Aug 2025 18:39:13 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43732 at https://www.okta.com</guid>
    </item>
<item>
  <title>Introducing Universal Logout for all Adaptive MFA customers</title>
  <link>https://www.okta.com/blog/2025/08/introducing-universal-logout-for-all-adaptive-mfa-customers/</link>
  <description>&lt;span&gt;Introducing Universal Logout for all Adaptive MFA customers&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Mon, 08/18/2025 - 16:40&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Secure sessions, on your own terms.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Okta is expanding the power of Universal Logout to more customers, providing better control over session management so that you can strengthen your organization’s security posture with minimal complexity.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The power of Universal Logout for session security &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Managing sessions and tokens across distributed applications has long challenged identity teams. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Universal Logout&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; is a powerful capability that allows admins to revoke sessions and tokens across federated applications.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Starting today, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Universal Logout is now available for all Okta Adaptive MFA&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; customers (with some restrictions as stated below). This feature enables Super Admins to manually clear sessions and revoke tokens from the Okta Admin Console, expanding their security toolkit for session management.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why change?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Whether responding to a compromised session, meeting compliance mandates, or cleaning up stale sessions, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;revoking all user access in a timely and effective manner is a critical capability.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Without Universal Logout, even if a user’s Okta session is cleared, downstream app sessions (sessions from the other applications that the user signed in to) might still be active, leaving a critical security gap. AMFA customers previously lacked a reliable, built-in way to close that gap.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;What’s new for Adaptive MFA customers?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Before today, Adaptive MFA customers were able to leverage session management capabilities like&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Clear all Okta sessions&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; (active sessions on all devices)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Revoke OIDC/OAuth tokens&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, requiring fresh re-authentication&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Clear “Keep me signed in” states&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;With this launch, AMFA Super Admins can now:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Revoke access for &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/itp/config-universal-logout.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;logout-enabled apps&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt; and Okta API tokens&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;But there are some important restrictions to be aware of:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
 &lt;/h3&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1280" height="734" alt="Screenshot: Clear sessions and revoke tokens" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/Screenshot%202025-08-18%20at%202.00.15%E2%80%AFPM.png?itok=z7uRf2L4" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt;&lt;em&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;*Note: This means &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Super Admins can manually revoke access for three users per minute&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; via the Okta Admin Console but can’t currently automate this process via API or Workflows integrations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why choose Okta?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This enhancement underscores &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/secure-identity-commitment/?_gl=1*11vqcej*_gcl_au*MTA1MTA5OTA4LjE3NDc3NDgxMjE.*_ga*MTM4MjIwNDkzNi4xNzM3NTc0NTQx*_ga_QKMSDV5369*czE3NTEyMjc2OTYkbzI5NCRnMSR0MTc1MTIyODQ1NiRqNDQkbDAkaDA." rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta’s&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Secure Identity Commitment&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; by expanding advanced security capabilities to more customers. We're helping more organizations reduce session-related risks and respond quickly to security incidents.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;And because you can access the feature through a familiar admin console, there's no need for complex setup or reconfiguration.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;What you can do today&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Curious about how you can access Adaptive MFA? Wonder no more.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;If you're an Adaptive MFA customer&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, you can access Universal Logout from the Okta Admin Console today.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Not yet on Adaptive MFA?&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Learn how Adaptive MFA helps protect against phishing and session hijacking: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/adaptive-multi-factor-authentication/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Explore Adaptive MFA&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;If you’re an Identity Threat Protection customer&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, good news: You already enjoy &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/identity-threat-protection/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;full Universal Logout functionality&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, including API-based triggers and automation.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Your feedback helps shape our product roadmap. Let us know how you’re using Universal Logout and what capabilities you'd like to see next.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Get started&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Ready to start using Universal Logout? Follow these simple instructions:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/itp/config-universal-logout.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Configure Universal Logout&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; for an application. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Once configured, log in to the Okta Admin Console → Navigate to a user profile → Click &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;More Actions → Clear sessions and revoke tokens&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="984" height="818" alt="Screenshot: Clear sessions and revoke tokens" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/Screenshot%202025-08-18%20at%202.00.51%E2%80%AFPM_0.png?itok=tryqw1Oi" class="lazyload" /&gt;&lt;/article&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/itp/universal-logout.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Learn more about Universal Logout&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt; in our help docs.&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Want to try out building UL? Sign up for the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://developer.okta.com/signup/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta Dev Org&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;These materials are intended for general informational purposes only and are not intended to be legal, privacy, security, compliance, or business advice.&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/universal-logout/" hreflang="en"&gt;Universal Logout&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/adaptive-mfa/" hreflang="en"&gt;Adaptive MFA&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/product/" hreflang="en"&gt;product&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/okta-secure-identity-product-blog-series/" hreflang="en"&gt;Okta Secure Identity Product Blog Series&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/company-product/" hreflang="en"&gt;Company + Product&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/bhavik-thakkar/"&gt;Bhavik Thakkar&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/bhavik-thakkar/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Bhavik Thakkar&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Product Manager 
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Bhavik is a Product Manager at Okta leading the Inbound Federations team and driving the development of Universal Logout functionality. He previously led Okta’s Access Request team and the Developer Community Products team, where he oversaw back-end SDKs and Okta’s Terraform provider. Bhavik holds an MS in Computer Science from Indiana University Bloomington and is passionate about all things identity and user experience.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Mon, 18 Aug 2025 23:40:25 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43509 at https://www.okta.com</guid>
    </item>
<item>
  <title>Bridging the gap in browser security with Google and Okta</title>
  <link>https://www.okta.com/blog/2025/08/bridging-the-gap-in-browser-security-with-google-and-okta/</link>
  <description>&lt;span&gt;Bridging the gap in browser security with Google and Okta&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Fri, 08/15/2025 - 08:20&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="924" height="260" alt="Secure Identity Blog Series Banner" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-05/Screenshot%202025-04-28%20at%201.45.24%E2%80%AFPM.png?itok=mjKbynVC" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt;
&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Browsers are today’s primary work portal. Most corporate applications and sensitive data now live behind SaaS and other cloud services, and we reach them through browsers like Chrome, Edge, and Safari.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This elevates the browser from a mere application to a critical policy enforcement point, which makes browser security a foundational element of a modern Zero Trust architecture. However, one gap continues to undermine enterprise browser security: employees using personal profiles to access corporate data.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Mixing personal and work browsing creates outsized risk, and managed browser profiles can help restore control without sacrificing user experience. Google and Okta have partnered to make managed Chrome profiles practical to scale.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why personal profiles are a problem&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;BYOD and hybrid work normalized the habit of using personal devices and browser profiles for work. On corporate machines, users commonly sign in to personal Chrome or Edge profiles to sync bookmarks and passwords. But that convenience comes at a cost. Key risks for personal browser use in the workplace include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Credential leakage&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Personal profiles make it easy to save work passwords into personal password managers and sync them beyond corporate oversight. When personal accounts or devices are compromised, attackers inherit corporate logins. Poor password hygiene compounds the risk: many employees reuse passwords between personal and work contexts or save work passwords straight into the browser.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Insecure or unvetted extensions&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Browser extensions are ubiquitous and powerful. Many request permissions to read and change site data, capture keystrokes, access cookies, and interact with local files. Employees can install anything — from helpful tools to risky adware — in a personal profile without review. That opens credible paths for data exfiltration, credential harvesting, and session hijacking. Because personal profiles sit outside your extension allowlist/denylist, they become a blind spot for prevention and forensics.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Policy evasion and shadow IT&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Web filtering, download restrictions, data loss protection (DLP), and other controls are often attached to managed browser contexts. A personal profile may sidestep those controls. Users can visit blocked sites, upload corporate files to personal drives, or use unapproved SaaS services. This activity wouldn’t show up in your SIEM, and remediation is harder because there’s no reliable audit trail.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The case for managed browser profiles&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The solution is to create a clear separation: bring all work-related browsing under corporate management while leaving personal use untouched. Managed browser profiles enforce your policies, support your identity stack, and provide the visibility your security teams need while allowing employees to maintain a separate personal profile. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://support.google.com/chrome/a/answer/15591684" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Google’s managed Chrome profiles&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; do precisely this and can be easily configured via the Google admin console and federated with Okta.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The control points for managed profiles are consistent and comprehensive. Identity and sign-in are anchored to a dedicated work profile and authenticated with corporate single sign-on or SSO (e.g., Okta), keeping work credentials, tokens, and cookies isolated from personal contexts. Administrators can enforce multi-factor authentication (MFA), disable password saving to personal vaults, and check device posture during authentication. Security policies like web filtering, safe browsing, DLP enforcement, certificate pinning, and VPN or SASE routing can be applied directly to the work profile and enforced uniformly across managed and unmanaged desktops. Extension control is also centralized, enabling IT teams to define allowlists, block unvetted add-ons, and auto-install trusted tools.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Managed browser profiles offer four clear benefits:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Data isolation&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Work credentials and session data stay within the managed profile, while personal browsing artifacts — like cookies, extensions, and passwords — remain separate. This limits risk if a personal account or device is compromised and prevents accidental data leaks (e.g., uploading sensitive files to personal cloud storage).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Consistent security policies&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Security controls — such as MFA, DLP, download restrictions, and password rules — follow users across devices. That helps ensure that access to SaaS apps stays protected through the managed profile, whether on corporate or personal machines.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Reduced risk and faster response&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Organizations reduce the attack surface by eliminating common threats like stored work credentials in personal profiles or unauthorized cloud uploads. Managed browser telemetry enables faster incident investigation and response.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Improved user experience&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: A managed profile minimizes distractions, seamlessly enforces security, and separates work from personal browsing. Users benefit from seamless SSO with pre-approved local network access policies and tools like &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/fastpass/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta FastPass&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;In short, managed profiles strike the balance between enterprise-grade security and employee productivity. They transform the browser from an unmanaged risk surface into a more secure, policy-enforced workspace, no matter where the user logs in.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;How Okta and Google simplify the rollout&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta and Google make managed profiles practical to deploy across managed and unmanaged Windows, macOS, and Linux devices. Provisioning the work profile starts with Okta federating sign-in to Chrome so that users authenticate with their corporate credentials. On first sign-in, a managed Chrome work profile is automatically created and bound to your organization’s policies, eliminating the need for a device management solution. For step-by-step setup guidance, see &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://support.google.com/chrome/a/answer/16307014" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Sign into Chrome with Okta&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, which walks through creating enterprise Chrome profiles that automatically receive your configured policies. The example below shows the end-user experience when launching the Chrome profile setup from the Okta dashboard.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Sign in to the "Setup Chrome Profile" app in the Okta end-user dashboard.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;p&gt;	&lt;img alt="Okta Dashboard with Chrome chiclet selected" height="1009" src="https://www.okta.com/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/chrome-chicklet.png?itok=26hsASAG" width="1640" /&gt;&lt;/p&gt;
&lt;p&gt;	 &lt;/p&gt;&lt;/li&gt;
&lt;li&gt; Sign in with FastPass.&lt;br /&gt;
	 
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1640" height="1025" alt="Fastpass sign-in screen" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/sign-in-with-fp.png?itok=jv2POo3r" class="lazyload" /&gt;&lt;/article&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Complete setup in Chrome&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;p&gt; &lt;/p&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1640" height="1025" alt="Screenshot of new Chrome profile setup" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/setup-new-profile.png?itok=RLR8cnsB" class="lazyload" /&gt;&lt;/article&gt;&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1640" height="1025" alt="Chrome setup complete message" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/all-set.png?itok=Cbjo6hW0" class="lazyload" /&gt;&lt;/article&gt;&lt;h2&gt;
&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;How to deliver a seamless, secure user experience&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Through &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/identity-engine/devices/chrome/enable-chrome-dt.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Chrome Device Trust Connector for Okta&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, admins can enforce &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/identity-engine/devices/chrome/device-assurance-chrome.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;device assurance policies&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; such as password restrictions, safe browsing, and site isolation, which are applied before the user accesses any corporate resources.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;For many organizations, delivering a smooth, passwordless sign-in experience is as important as enforcing strong security policies. Features like Okta FastPass help achieve both by enabling phishing-resistant authentication with minimal user disruption. However, Chrome’s new Local Network Access (LNA) prompt can interrupt these flows if not pre-configured.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;To support FastPass and other authentication flows that rely on a local loopback server, administrators can configure the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;LocalNetworkAccessAllowedForUrls&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; policy for their Okta sign-in domains, suppressing Chrome’s network access prompt and maintaining a seamless sign-in experience. This should be paired with &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;LocalNetworkAccessRestrictionsEnabled&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; to ensure consistency in enforcement. Once users sign in to the managed Chrome profile with Okta, they receive single-click access to their work apps, with all policies and approved extensions applying automatically, while personal browsing remains untouched. See &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://support.okta.com/help/s/article/configure-chrome-to-suppress-the-local-network-access-prompt-for-okta-fastpass" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Configure Chrome to Suppress the Local Network Access Prompt for Okta FastPass&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; to learn more.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Secure browsers make a secure organization&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It’s no longer enough to think of the enterprise endpoint as just the device — it's also the browser session. Treating that session as a managed, secure workspace is one of the most effective ways to protect identity, data, and access.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Managed browser profiles, or secure enterprise browsers, offer clean separation between work and personal use, consistent policy enforcement across desktops, improved observability for security teams, and a smoother, less disruptive user experience.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;With Okta and Chrome Enterprise, you can roll this out pragmatically. To make the browser your most defended app and bootstrap managed Chrome profiles with Okta, look at the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://support.google.com/chrome/a/answer/16307014" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;documentation&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; mentioned above. Learn more about Okta’s Chrome integrations and device assurance policies by visiting the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/adaptive-multi-factor-authentication/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Adaptive MFA webpage&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;
&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;These materials and any recommendations within are not legal, privacy, security, compliance, or business advice. These materials are intended for general informational purposes only and may not reflect the most current security, privacy, and legal developments nor all relevant issues. You are responsible for obtaining legal, security, privacy, compliance, or business advice from your own lawyer or other professional advisor and should not rely on the recommendations herein. Okta is not liable to you for any loss or damages that may result from your implementation of any recommendations in these materials. Okta makes no representations, warranties, or other assurances regarding the content of these materials.  Information regarding Okta's contractual assurances to its customers can be found at &lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="http://okta.com/agreements" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;okta.com/agreements&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;em&gt;&lt;span&gt;.&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/okta-secure-identity-product-blog-series/" hreflang="en"&gt;Okta Secure Identity Product Blog Series&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/google/" hreflang="en"&gt;Google&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/customer-identity/" hreflang="en"&gt;Customer identity&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/okta-fastpass/" hreflang="en"&gt;Okta Fastpass&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/customers-partners/" hreflang="en"&gt;Customers + Partners&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/karthig-balendran/"&gt;Karthig Balendran&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/karthig-balendran/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Karthig Balendran&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Group Product Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Karthig is a Group Product Manager on Okta's Access Management team, where he leads strategy and execution for Device Assurance, FastPass, and Okta Verify. His work focuses on strengthening Zero Trust security by making it easier for organizations to enforce device context and deliver phishing-resistant authentication. He’s passionate about bridging enterprise security and user experience, especially in complex, cross-platform environments. Before joining Okta, Karthig worked on Microsoft Teams and Intune. Outside of work, you can find him riding through the hills outside Seattle with his kids in tow.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/cynthia-luu/"&gt;Cynthia Luu&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/cynthia-luu/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Cynthia Luu&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Principal Product Marketing Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Cynthia is a Principal Product Marketing Manager of Okta Workforce Identity Cloud. She covers solutions for devices and security. Prior to joining Okta, she spent four years supporting IBM security in various marketing roles, managing IBM’s portfolio of data protection solutions, initiatives on Zero Trust and data privacy, and their market development and customer insights programs.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Fri, 15 Aug 2025 15:20:27 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43581 at https://www.okta.com</guid>
    </item>
<item>
  <title>Scaling success: How the Oktane Ambassador Program unleashed the power of our people</title>
  <link>https://www.okta.com/blog/2025/08/scaling-success-how-the-oktane-ambassador-program-unleashed-the-power-of-our-people/</link>
  <description>&lt;span&gt;Scaling success: How the Oktane Ambassador Program unleashed the power of our people&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Wed, 08/13/2025 - 16:53&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;If you’ve ever attended our &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/oktane/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;customer conference, Oktane&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, you know it unites the Okta community to share what’s next in the world of identity security. But as the annual event has continued growing, we’ve faced a challenge that many scaling programs encounter: Our internal resources struggled to keep pace. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Demand for information and on-site support was higher than ever, and as the program lead, I couldn't be everywhere at once. How could we ensure every attendee — internal and external — had a world-class experience? The answer wasn't in a larger budget (though I’ll never turn that down) or headcount (though I won’t turn that down either), but in a priceless, untapped resource: our own employees.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This passion project of mine had been top of mind for several years. I can’t remember exactly why 2024 was &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;em&gt;&lt;span&gt;the year &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;that I was determined to get it off the ground. But I knew if it didn’t happen now, I would keep telling myself, ”I’ll do it next year.” This realization sparked the creation of the Oktane Ambassador Program (OAP), an initiative that has solved our scaling challenges and fostered a deeper sense of ownership and pride in our company's flagship event.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;A shared vision to build the Oktane community&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It all began as a simple idea. I needed a way to decentralize information and extend my reach. Maybe playing into this being &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;em&gt;&lt;span&gt;the year&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, I quickly learned that our Customer Success team was simultaneously exploring the creation of an “Ambassador" program to bring more Customer Success Managers to Oktane. The stars aligned: we joined forces, and the official Oktane Ambassador Program was born.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We launched an internal application, unsure of what to expect. To my pleasant surprise, the response was astounding. Over 100 Okta employees from every corner of the company — spanning different teams, organizations, regions, and skillsets — raised their hands, eager to be a part of Oktane in a meaningful way. From this incredible pool of talent, we selected our inaugural class of 35 Ambassadors. My partners from Customer Success quickly became my support system and sounding board, leading to the creation of the invaluable Oktane Ambassador Program Leadership Council, and together, we embarked on this exciting new chapter.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;In the months leading up to Oktane, our Ambassadors became extensions of the core event team. We armed them with the latest information, and they disseminated it to their respective departments, answering questions and funneling key themes and feedback back to us. They took on special projects, assisting our Core Team and bringing fresh perspectives to the table. Throughout the planning process, we kept direct lines to our Ambassadors open through a team Slack channel and bi-weekly check-ins, ensuring they felt supported.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Once on-site, the Ambassadors were instrumental to the success of the event. Decked out in exclusive swag,  they took on critical roles, from commanding the control center of the expo hall — the Okta Hub — to supporting our customer speakers in breakout sessions. One Ambassador even stepped into the role of an events producer for our Live News Desk, a cornerstone of the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/oktane/online/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Oktane Online&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; experience. Their presence was felt everywhere, and their contributions were immeasurable.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Creating a culture of advocacy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The first year was a resounding success, but we knew we could make it even better. As we prepared for this year's program, we refined our approach. We made our application questions more intentional, focusing on specific skill sets and each applicant’s passions and interests. The result? Nearly double the applications and a wave of innovative ideas, including a proposal to leverage AI to help elevate the Core Team’s efficiency and enable employees to get self-serve answers to their questions in Slack.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;To further streamline our efforts, we've structured this year's Ambassador program into four key pillars: Customer Success, Go-to-Market/Field, Global, and Special Projects. This has allowed for even greater focus and impact. In fact, the head of our Sales Development Representatives team wanted to get in on this program and supported funding stand-outs from his own organization to be part of the Oktane Ambassador Program.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;All levels of Okta, including company leadership, has shown enthusiasm for the Oktane Ambassador Program. It's a testament to the power of finding untapped potential within our own walls and giving our employees a true sense of purpose and ownership in something bigger than their day-to-day roles.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This year, we've also empowered our Ambassadors to be external advocates. We've armed them with social media posts to share on platforms like LinkedIn, proudly announcing their participation and inviting their networks to connect with them. This has amplified the program’s reach while strengthening the Oktane brand externally.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The program’s success is a powerful reminder that sometimes the most innovative solutions are right in front of us. It’s become a model for other teams at Okta, demonstrating how to effectively leverage the diverse talents of our people to achieve extraordinary results. We've solved our scaling problem, created a vibrant community of champions, and are inspired to make Oktane better than ever before.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Advice for scaling your own ambassador programs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Here are some key learnings from our journey that you can apply to your programs:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;The power of internal partnerships: &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Look for opportunities to collaborate and find shared goals within your organization. A seemingly independent initiative can gain significant momentum and resources by partnering with other teams working towards similar objectives.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Invest in your ambassadors&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Provide comprehensive training and resources, ensuring they have the information needed for success. Foster an environment of open communication through regular check-ins and dedicated channels, and they will feel supported and connected. Finally, make their work meaningful by matching their interests and expertise with key event pillars, filling gaps, and ensuring their contributions truly enhance the program.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Keep evolving&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Solicit feedback throughout the process, not just once the event is over or at the end of the year. Adjust the questions you ask and be willing to learn to curate a more intentional experience from the start. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Executive buy-in is priceless&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: Embrace leadership support, even just financially. It signifies the program’s value and can attract more internal talent.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The countdown to &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/oktane/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Oktane&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; is on, and we can’t wait to see what this year will bring.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/oktane-ambassador-program/" hreflang="en"&gt;Oktane Ambassador Program&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/oktane-25/" hreflang="en"&gt;Oktane 25&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/life-at-okta/" hreflang="en"&gt;#lifeatokta&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/industry-insight/" hreflang="en"&gt;Industry Insight&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/katie-batten/"&gt;Katie Batten&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/katie-batten/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Katie Batten&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Director, Strategic Event Marketing
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Katie Batten is the Director of Strategic Event Marketing at Okta and has over a decade of experience in planning and executing events. Prior to Okta, Katie led the corporate and trade show event strategy at Jive and Achievers in the Bay Area and HRCI in Northern Virginia. She is originally from Portland, OR, and her passions include travel, sports (Go Blazers!), and all things Disney. She currently resides in the Bay Area and holds an MTA from The George Washington University.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Wed, 13 Aug 2025 23:53:08 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43510 at https://www.okta.com</guid>
    </item>
<item>
  <title>Risk-based policy-driven security with Device Logout</title>
  <link>https://www.okta.com/blog/2025/08/risk-based-policy-driven-security-with-device-logout/</link>
  <description>&lt;span&gt;Risk-based policy-driven security with Device Logout&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Tue, 08/12/2025 - 07:00&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="924" height="260" alt="Secure Identity Blog Series Banner" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-05/Screenshot%202025-04-28%20at%201.45.24%E2%80%AFPM.png?itok=mjKbynVC" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Automating actions through policies is one of the most effective ways to build robust and comprehensive security. For instance, when an employee leaves the company, all permissions can be promptly revoked via policies to avoid lingering access vulnerabilities. This is especially pertinent to organizations with employee turnover or temporary staff, such as contractors. With automated policies in place, the moment a worker’s time at the company has come to an end, their access to resources and devices is also terminated.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Defining clear security policies helps organizations automate granting and revoking user permissions based on user status, context clues, risk level, and minimum requirements. This helps ensure that users only have access to the resources they require and under the right circumstances, reducing the risk of privilege creep and insider threats.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;With &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/device-access/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta Device Access&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, organizations can extend identity security to corporate devices. Okta Device Access supports a range of features to help secure device login, including &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/oda/macos-mfa/configure-macos-mfa.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Desktop MFA&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/oda/macos-pw-sync/configure-macos-password-sync.htm"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Desktop Password Sync&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/oda/macos-pw-sync/jit-provisioning-oda.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Just-in-Time Local Account Creation&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, and more. With a new feature called Device Logout, managing user and device identities is even easier.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Introducing Device Logout with Okta Device Access&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Device Logout is a new security feature that empowers organizations to log out risky or inactive users. By leveraging Desktop MFA, it forces users to reauthenticate, helping to ensure that only legitimate individuals have access.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="774" height="510" alt="Device Logout end user screen" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/Device%20Logout%20End%20User%20Final%202.png?itok=yewwWO1q" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Device Logout can work alongside &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/identity-threat-protection/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Identity Threat Protection for Okta AI&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, highlighting the power of the Okta Platform as an identity security fabric in practice. With device access management driven by integrated and orchestrated identity security, Device Logout can be leveraged in the following flows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;An admin can manually trigger Device Logout for a specific user&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;An admin can automatically trigger Device Logout when a user is deactivated or suspended in Okta&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;An admin can automatically trigger Device Logout for a risky user by configuring an Identity Threat Protection entity risk policy (Identity Threat Protection is required)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;An admin can use Identity Threat Protection to manually log a user out from their device(s) when clearing user sessions from the user’s profile page&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt; &lt;/p&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1640" height="845" alt="Device Logout User Interface" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/Device%20Logout%20UI%203.2_0.png?itok=rWUiNw8d" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;With Okta Device Access and Device Logout enabled, a Universal Logout command will automatically log a user out of all applications, active sessions, and, now, their devices. This illustrates the value of Okta’s comprehensive approach to identity security and the power of secure identity orchestration, which unifies risk signals, policies, and automation to respond to threats in real time.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;How to start using Device Logout today&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Device Logout support for macOS is available today as a &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/security/manage-ea-and-beta-features.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;self-service Early Access feature&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; with Okta Device Access. You must have access to Identity Threat Protection within your Okta tenant to enable device logout flows that depend on it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Please refer to the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/oie/en-us/content/topics/oda/device-logout.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;product documentation&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; to learn more about Device Logout. You can also visit the product web pages to learn about &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/device-access/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta Device Access&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/identity-threat-protection/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Identity Threat Protection&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/device-logout/" hreflang="en"&gt;Device Logout&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/identity-threat-protection/" hreflang="en"&gt;Identity Threat Protection&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/okta-device-access/" hreflang="en"&gt;Okta Device Access&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/okta-secure-identity-product-blog-series/" hreflang="en"&gt;Okta Secure Identity Product Blog Series&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/workforce/" hreflang="en"&gt;Workforce&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/company-product/" hreflang="en"&gt;Company + Product&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/cynthia-luu/"&gt;Cynthia Luu&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/cynthia-luu/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Cynthia Luu&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Principal Product Marketing Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Cynthia is a Principal Product Marketing Manager of Okta Workforce Identity Cloud. She covers solutions for devices and security. Prior to joining Okta, she spent four years supporting IBM security in various marketing roles, managing IBM’s portfolio of data protection solutions, initiatives on Zero Trust and data privacy, and their market development and customer insights programs.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Tue, 12 Aug 2025 14:00:00 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43487 at https://www.okta.com</guid>
    </item>
<item>
  <title>Making MFA mandatory for securing the admin console front door</title>
  <link>https://www.okta.com/blog/2025/08/making-mfa-mandatory-for-securing-the-admin-console-front-door/</link>
  <description>&lt;span&gt;Making MFA mandatory for securing the admin console front door&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Mon, 08/11/2025 - 07:00&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta is committed to providing our customers with the highest level of security. We were among the first technology providers to &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://sec.okta.com/articles/2025/05/oktas-secure-by-design-pledge-one-year-on/?_gl=1*97mrtb*_gcl_aw*R0NMLjE3NTMyOTU0MzIuQ2owS0NRandrSUxFQmhEZUFSSXNBTC0tcGp5eDVjWS1RTEQ5ejFDVjZ3a0d6M3l2cVlxaHlTU2piN28zYWgwa25fdmxPSFFCbnJHdzhBb2FBcmRRRUFMd193Y0I.*_gcl_au*NjgxMTQzMjYxLjE3NDc0MDc3NzMuMjEzNzQzMTM4OC4xNzUyNjA1MzQ4LjE3NTI2MDUzNDc.*_ga*MTg2MzU3NTI3Ny4xNzI5NjI2NjU4*_ga_QKMSDV5369*czE3NTMyOTUxNzUkbzQyOCRnMSR0MTc1MzI5NTQ3MyRqNjAkbDAkaDA." rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;pledge our commitment to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA’s) seven Secure by Design principles&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, and a year ago, we launched the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/secure-identity-commitment/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta Secure Identity Commitment&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Under these initiatives, we’ve announced and delivered a number of essential features and upgrades for our corporate infrastructure and product portfolio. This includes encouraging customers to use one of the most effective security measures available: a strong and consistent approach to multi-factor authentication (MFA). To help raise the security baseline for everyone, we began enforcing MFA for all Okta Admin Console logins in 2024. It’s a smart, necessary step in our shared commitment to identity-first security.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Today, we’re proud to share that &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Okta has achieved 100% MFA enforcement to the Okta Admin Console&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; for all existing Okta tenants in one year. And for all new tenants, MFA is a default and immutable requirement for access policies to the Okta Admin Console.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why is MFA being enforced for the Okta Admin Console?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The Okta Admin Console is the central hub for managing Okta users, Okta-protected applications, and Okta security policies. Unauthorized access to this console can have devastating consequences that include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Data breaches:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Attackers could access sensitive user information and application data.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;System compromise:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Threat actors can alter security settings, create backdoor accounts, and disable critical security features.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Service disruption:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Unauthorized changes can lead to outages and impaired functionality for end users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Reputational damage:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; A security incident can severely impact an organization's business and brand.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;MFA significantly reduces the risk of these outcomes by requiring a second verification factor on top of a password, such as a time-based one-time password (TOTP) from a mobile authenticator app, a fingerprint scan, or a hardware token. While Okta only mandates MFA with any two of knowledge, possession, or inherence factors, Okta strongly encourages admins to move away from passwords and enable the most secure authenticators available, which include phishing-resistant authenticators like Okta Verify FastPass and FIDO2 WebAuthn authenticators.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta provides robust features to enforce MFA for administrative access. All Okta tenants come with a baseline number of supported factors, such as Okta Verify TOTP, FastPass, and email, in addition to passwords. Okta also provides a flexible policy that allows admins to enforce MFA specifically to the Okta Admin Console.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The application policy for the console has always required MFA by default. However, admins were allowed to downgrade the setting to one-factor authentication (1FA), which many opted to do for various reasons. Now, Okta prevents this default security stance from being downgraded, and we’ve helped all existing customers elevate their security posture with MFA.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;How we convinced Okta customers to enforce MFA&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Let’s jump into how we helped admins overcome their real and perceived need to maintain 1FA policies and embrace MFA to secure access to the Okta Admin Console. In general, customers accepted that MFA was a good thing to instill. However, there were several common reasons why they believed they had to stay at the 1FA assurance level:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Admins were unaware that they had policy rules that allowed for 1FA access.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Admins thought that they did not need MFA since they vaulted their passwords and rotated them upon every use.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Admins completed MFA with a different identity provider (IdP) than Okta and were federating into the Okta Admin Console.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Admins had automated test accounts that needed to log in to the console.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Admins were concerned about Lightweight Directory Access Protocol (LDAP) and Active Directory (AD) agent operations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We took pains to address each of these hurdles and concerns. That last issue was easy enough to address with a simple confirmation that there would be no impact on normal agent operations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;However, as for the rest, we first published warnings to admins if they had a tenant with any rules allowing 1FA access via our HealthInsights feature.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="1444" height="576" alt="Screenshot showing HealthInsights review with 1FA warning" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/healthInsight.png?itok=6ptetc0a" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We also published warnings from the Okta Admin Console policy, highlighting these offending rules.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;article class="align-center media media--type-image media--view-mode-_640w-scaled"&gt;&lt;img width="896" height="297" alt="1FA warning in Okta Admin Dashboard" loading="lazy" typeof="foaf:Image" data-src="/sites/default/files/styles/1640w_scaled/public/media/image/2025-08/1FA-warning.png?itok=5jWMxJU4" class="lazyload" /&gt;&lt;/article&gt;&lt;p&gt;
&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;For admins who believed they didn’t need MFA since they regularly vaulted and rotated their passwords, we reinforced that MFA protection is superior. While customers should continue to vault and rotate their secrets, they should also add an additional factor requirement, specifically a possession or biometric factor. If vaulted passwords were shared with multiple users, we recommended that each user have their own unique account instead.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;As for other customers, some have chosen to complete MFA on an external IdP and federate into the Okta Admin Console. Until recently, Okta treated that inbound federation as a single factor. However, we now have a new feature called &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://developer.okta.com/docs/guides/configure-claims-sharing/oktaoidc/main/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;claims sharing&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;. The IdP can send standards-based AMR claims within the SAML or OIDC response, and Okta will honor the factors completed with the other IdP as satisfactory for MFA assurance. Thus, another hurdle was removed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;For customers with automated test accounts that logged in to the console to complete tests, the admins believed that providing an additional factor would not be possible for such accounts. Okta addressed this issue by recommending that the test accounts &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://developer.okta.com/docs/reference/api/authn/#enroll-okta-verify-totp-factor" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;enroll in a TOTP factor&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; and vault the shared secret along with the password. After checking out the password, the shared secret can also be checked out and utilized to &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://pyauth.github.io/pyotp/#time-based-otps" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;programmatically generate&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; the TOTP at the time of login.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;With all of these customer challenges resolved, our customers were ready to take action.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Preparing to roll out changes&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Given the large number of Okta tenants we were dealing with, ranging from free trial and developer tenants to tenants with large and complicated implementations, it was necessary to stagger the rollout to help ensure minimal disruption to normal operations. Therefore, we employed several tactics to enforce MFA to the Okta Admin Console carefully:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Announce the initiative&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: In addition to public announcements and blogs indicating imminent MFA enforcement, we published in-product guides and banners on the Okta developer and support portals and sent targeted emails to admins to inform them of the upcoming changes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Prevent the creation of all new 1FA access policies&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: As a first step, Okta rolled out changes to all tenants so that no new 1FA access policy could be established. The idea was to stop the bleeding before the complete fix rolled out.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;Divide customers into cohorts for MFA enforcement&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;: To mitigate the risk of a flood of support tickets to Okta and prevent unnecessary admin lockouts, we rolled out this change by customer cohorts. We first examined each tenant’s configurations and grouped them based on the remediation steps they would require to enforce MFA. Then we selected different enforcement dates for each cohort and prepared specific remediation instructions.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Admins were instructed to modify their Okta Admin Console policies in the following ways:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Rules with password-only assurance should be modified to require a password and another factor.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Rules with any 1FA assurance or possession-factor-only assurance should be modified to require any two factors.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Once the change was made, admins were not allowed to downgrade back to 1FA assurance. If an admin did not take action, Okta enforced MFA to the console for that tenant on a clearly communicated date.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Okta customers hit the ground running towards MFA&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Within the first four months of the rollout, Okta completed enforcement of MFA on 99% of all applicable tenants. The remaining 1% were tenants that required additional support from Okta, either in the form of feature enhancements, like &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://developer.okta.com/docs/guides/configure-claims-sharing/oktaoidc/main/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;claims sharing&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;, or time to update various processes to operate at this new required security level. Okta stayed in touch with this group of customers to understand their pain points deeply and collaborate with them until they were confident about moving forward in this new direction.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;With 100% MFA enforcement to the Okta Admin Console, admins are now leveraging a variety of factors and authenticators to sign in to the console. The top three factors used include password, Okta Verify push notifications, and Okta FastPass. Common combinations of these factors used to complete an MFA challenge include password and Okta Verify push, as well as password and Okta FastPass.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Today, MFA access to the Okta Admin Console is a non-negotiable requirement for all current and newly onboarded Okta admins. By embracing this secure posture by default, customers benefit from a reduced attack surface and greater protection of critical identity infrastructure.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Learn more about Okta’s MFA product by visiting the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/adaptive-multi-factor-authentication/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Adaptive MFA webpage&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;. Keep tabs on what Okta is doing to fight against identity-based attacks by learning about the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/secure-identity-commitment/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta Secure Identity Commitment&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/mfa/" hreflang="en"&gt;MFA&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/okta-secure-identity-commitment/" hreflang="en"&gt;Okta Secure Identity Commitment&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/industry-insight/" hreflang="en"&gt;Industry Insight&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/bhagya-prabhakar/"&gt;Bhagya Prabhakar&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/bhagya-prabhakar/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Bhagya Prabhakar&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Senior Product Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Bhagya Prabhakar is a Senior Product Manager at Okta, specializing in access policies. With a deep commitment to customer success, she focuses on crafting solutions that seamlessly blend robust security with intuitive usability, directly supporting organizational goals and positive end-user experiences.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/cynthia-luu/"&gt;Cynthia Luu&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/cynthia-luu/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Cynthia Luu&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Principal Product Marketing Manager
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Cynthia is a Principal Product Marketing Manager of Okta Workforce Identity Cloud. She covers solutions for devices and security. Prior to joining Okta, she spent four years supporting IBM security in various marketing roles, managing IBM’s portfolio of data protection solutions, initiatives on Zero Trust and data privacy, and their market development and customer insights programs.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Mon, 11 Aug 2025 14:00:00 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43473 at https://www.okta.com</guid>
    </item>
<item>
  <title>Unlocking SaaS Security: How Identity can help</title>
  <link>https://www.okta.com/blog/2025/08/unlocking-saas-security-how-identity-can-help/</link>
  <description>&lt;span&gt;Unlocking SaaS Security: How Identity can help&lt;/span&gt;
&lt;span&gt;&lt;span lang="" about="https://www.okta.com/user/7392" typeof="schema:Person" property="schema:name" datatype="" content="jess.bagherpour@okta.com" xml:lang=""&gt;jess.bagherpou…&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;Wed, 08/06/2025 - 07:00&lt;/span&gt;
  



  &lt;div class="BodyParagraph"&gt;
                &lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;SaaS developers and builders, SaaS users, enterprise security teams, and Identity Providers may all play seemingly disconnected roles in a SaaS environment. But everyone can support a unified SaaS Security strategy by focusing on Identity. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Read on to learn a simple three-pronged approach for kicking off your own SaaS security strategy. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;What is SaaS security?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.okta.com/identity-101/saas/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Software as a service (SaaS)&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; security is the practice of protecting cloud and SaaS applications by securing accounts, data, and access. Whether you use multiple SaaS products at work or build them for enterprise customers, keeping these apps and tools secure is essential. While SaaS security can be a broad term, it generally refers to products used in a workplace context.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why is SaaS security important&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;? &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.okta.com/blog/2020/09/best-of-breed-technology/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Best-of-breed&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; SaaS products enable businesses to ignite employee productivity. However, the SaaS landscape is sprawling, interconnected, and growing quickly. This poses challenges for security and IT teams tasked with managing employee access and usage across these disparate platforms. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why is Identity security central to SaaS security?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Many common attack vectors target SaaS applications in the wild using &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/sites/default/files/2022-09/202209_WPR_Identity-Based-Attacks_0.pdf" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Identity-based attacks.&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; Enterprises can protect their data and users from SaaS-related attacks with a foundational Identity security strategy. Additionally, builders of these SaaS products can give their customers a security boost by implementing modern Identity solutions and standards.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;SaaS challenges for enterprises&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The proliferation of SaaS tools and cloud environments is challenging to manage. The decentralized landscape is an attractive target for malicious actors. Such challenges generally fall into two buckets: the user lifecycle and cyber threats. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; User lifecycle risks to consider&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;SaaS tools can be accessed from anywhere, increasing the attack surface far beyond the company's internal network and traditional devices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;SaaS tools can be frequently added or removed, requiring manual effort to manage or decommission vendors. Likewise, user accounts need prompt onboarding and offboarding.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;User and service accounts are varied and spread across multiple applications, so access to certain tools must be routinely reviewed and reported on to ensure regulatory compliance.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Cyberthreats to consider&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Over-privileged accounts present undue risk.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Credentials may be long-lived and over-provisioned or shared.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Data shared with vendor tools may not be properly secured&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Phishing attacks now target SaaS tools, so user security education as well as phishing-resistant login techniques are critical&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Identity-based solutions for SaaS security&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Although businesses cannot control the inner workings of SaaS applications, they can enforce consistent processes and policies across their environment using automation and partners such as an Identity provider (IdP).  Businesses can also choose solutions that implement the most modern and secure protocols. The IdP can serve as the frontline enforcer of such policies, so the business can develop the security policies that will best protect its information, resources, and customers. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Implementing a new SaaS security policy can be daunting. We recommend keeping it simple with a three-pronged approach. Get all of these essentials right, and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;you’ll be well on your way to a more secure SaaS environment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Standardize and secure authentication and provisioning&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Consistently enforce SSO and MFA across all SaaS applications&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Include device trust in &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://help.okta.com/en-us/content/topics/security/policies/about-app-signon-policies.htm" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;sign-on policies&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; and adopt phishing-resistant login methods like &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/products/fastpass/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;Okta FastPass&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Automate provisioning with clear policies for onboarding, offboarding, and user profile management. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Automate identity management with &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/blog/2024/08/cooking-up-successget-familiar-with-okta-workflows-features-to-unlock-no-code/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;customized workflows&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol start="2"&gt;&lt;li&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Enforce least privilege and strengthen access policies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Regularly rotate credentials and use&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/Identity-101/privileged-access-management-solutions/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt; temporary credentials&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Require step-up authentication for unusual access and utilize &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://sec.okta.com/articles/2024/04/why-cyber-heroes-need-zero-trust-caep" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;continuous access evaluation&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Set alerts for when critical threats or exploits are detected&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Limit and review admin or unmanaged accounts&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Implement the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.okta.com/identity-101/what-is-least-privilege-access/" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;principle of least privilege access&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol start="3"&gt;&lt;li&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Understand how applications interact with each other&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Limit sharing data with other tools to what is necessary&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Setup enforceable policies to manage how workforce accounts share data with SaaS services&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Incorporate network security policies into existing access policies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Building a SaaS product?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Builders of B2B SaaS products can jumpstart their customers' SaaS security posture by incorporating modern Identity solutions from the start. This includes adhering to modern standards and following &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://okta.okta.com/app/okta_wwwoktawebdev_1/exk1h9uxhqgolDA2W1d8/sso/saml" rel=" noopener noreferrer" target="_blank"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;u&gt;&lt;span&gt;&lt;span&gt;industry best practices&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;


      &lt;/div&gt;

  &lt;a href="https://www.okta.com/blog/tag/saas-security/" hreflang="en"&gt;Saas Security&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/identity-security/" hreflang="en"&gt;Identity security&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/tag/okta-secure-identity-commitment/" hreflang="en"&gt;Okta Secure Identity Commitment&lt;/a&gt;
  &lt;a href="https://www.okta.com/blog/category/industry-insight/" hreflang="en"&gt;Industry Insight&lt;/a&gt;
  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/sofia-desenberg/"&gt;Sofia Desenberg&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/sofia-desenberg/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Sofia Desenberg&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Staff Software Engineer
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Sofia is a Staff Software Engineer at Okta. With experience on security and data-focused teams spanning large companies and small startups — as well as past roles at Auth0 — she is passionate about Okta's mission to enable secure access to technology for everyone.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

  






&lt;section class="Breadcrumb"&gt;&lt;div class="container"&gt;
    &lt;div class="row"&gt;
      &lt;div class="col-12"&gt;
        &lt;ul class="list"&gt;&lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/"&gt;Blog&lt;/a&gt;&lt;/li&gt;
                      &lt;li class="list-item"&gt;&lt;a href="https://www.okta.com/blog/author/meghna-dubey/"&gt;Meghna Dubey&lt;/a&gt;&lt;/li&gt;
                  &lt;/ul&gt;&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;&lt;div class="BlogAuthorFull container mt-4" role="article" about="https://www.okta.com/blog/author/meghna-dubey/"&gt;
  &lt;div class="row justify-content-center"&gt;
    &lt;div class="col-lg-12"&gt;
      


&lt;div class="Author__byline-wrapper   pb-3 has-border-bottom "&gt;
    &lt;div class="Author__byline-author byline-with-bio"&gt;

        &lt;div class="Author__byline-author_bio-wrapper"&gt;
            &lt;div class="Author__byline-author_image-name-wrapper"&gt;
            &lt;div class="Author__byline-author-image  large-author-image "&gt;
                
            &lt;/div&gt;

            &lt;div class="Author__byline-author-list"&gt;
                &lt;div class="Author__byline-author-wrapper"&gt;
                                    &lt;h1 class="Author__byline-author-name"&gt;
                        &lt;span&gt;Meghna Dubey&lt;/span&gt;

                    &lt;/h1&gt;
                                &lt;div class="Author__byline-author-title"&gt;  Principal Engineer at Okta
&lt;/div&gt;
                &lt;/div&gt;
            &lt;/div&gt;
            &lt;/div&gt;

                        &lt;div class="Author__byline-author_bio"&gt;
                                &lt;p&gt;Meghna Dubey is a Principal Engineer at Okta, focused on adding value to Okta Identity Orchestration and driving new integration capabilities. A seasoned engineer and leader, she has deep expertise in architecting, designing, and developing secure and scalable software solutions. She views technology exploration as essential to creating more secure and innovative products. Meghna firmly believes that any problem can be solved by breaking it down, starting with a simple approach, and refining it into a robust solution.&lt;/p&gt;


              

            &lt;/div&gt;
            
            
        &lt;/div&gt;

    &lt;/div&gt;
&lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

</description>
  <pubDate>Wed, 06 Aug 2025 14:00:00 +0000</pubDate>
    <dc:creator/>
    <guid isPermaLink="false">43417 at https://www.okta.com</guid>
    </item>

  </channel>
</rss>
