{"id":1624,"date":"2022-07-05T09:57:53","date_gmt":"2022-07-05T09:57:53","guid":{"rendered":"https:\/\/blog.amt.in\/?p=1624"},"modified":"2022-07-05T09:57:53","modified_gmt":"2022-07-05T09:57:53","slug":"introduction-to-okta","status":"publish","type":"post","link":"https:\/\/blog.amt.in\/index.php\/2022\/07\/05\/introduction-to-okta\/","title":{"rendered":"Introduction to OKTA"},"content":{"rendered":"<p>Okta, Inc.\u00c2\u00a0(formerly\u00c2\u00a0Saasure Inc.) is an American\u00c2\u00a0identity and access management\u00c2\u00a0company based in San Francisco. It provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, website web services and devices.<\/p>\n<p>Identity management\u00c2\u00a0(IdM), also known as\u00c2\u00a0identity and access management\u00c2\u00a0(IAM\u00c2\u00a0or\u00c2\u00a0IdAM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of\u00c2\u00a0IT security\u00c2\u00a0and\u00c2\u00a0data management. Identity and access management systems not only identify, authenticate, and control access for individuals who will be utilizing IT resources but also the hardware and applications employees need to access.<\/p>\n<p>IdM addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.<\/p>\n<p>The terms &#8220;identity management&#8221; (IdM) and &#8220;identity and access management&#8221; are used interchangeably in the area of identity access management.<\/p>\n<p>Identity-management systems, products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and\u00c2\u00a0software applications.<\/p>\n<p>IdM covers issues such as how users gain an\u00c2\u00a0identity, the roles, and sometimes the permissions that identity grants, the protection of that identity, and the technologies supporting that protection (e.g.,\u00c2\u00a0network protocols,\u00c2\u00a0digital certificates,\u00c2\u00a0passwords, etc.).<\/p>\n<p>In the real-world context of engineering online systems, identity management can involve five basic functions:<\/p>\n<ol>\n<li>The pure identity function: Creation, management and deletion of identities without regard to access or entitlements;<\/li>\n<li>The user access (log-on) function: For example: a\u00c2\u00a0smart card\u00c2\u00a0and its associated data used by a customer to log on to a service or services (a traditional view);<\/li>\n<li>The service function: A system that delivers personalized, role-based, online, on-demand, multimedia (content), presence-based services to users and their devices.<\/li>\n<li>Identity Federation: A system that relies on\u00c2\u00a0federated identity\u00c2\u00a0to authenticate a user without knowing their password.<\/li>\n<li>Audit function: Monitor bottlenecks, malfunctions and suspect behaviour.<\/li>\n<\/ol>\n<p>In addition to creation, deletion, modification of user identity data either assisted or self-service, identity management controls ancillary entity data for use by applications, such as contact information or location.<\/p>\n<ul>\n<li>Authentication\u00c2\u00a0: Verification that an entity is who\/what it claims to be using a password, biometrics such as a fingerprint, or distinctive behavior such as a gesture pattern on a touchscreen.<\/li>\n<li>Authorization\u00c2\u00a0: Managing authorization information that defines what operations an entity can perform in the context of a specific application. For example, one user might be authorized to enter a sales order, while a different user is authorized to approve the credit request for that order.<\/li>\n<li>Roles\u00c2\u00a0: Roles are groups of operations and\/or other roles. Users are granted roles often related to a particular job or job function. Roles are granted authorizations, effectively authorizing all users which have been granted the role. For example, a user administrator role might be authorized to reset a user&#8217;s password, while a system administrator role might have the ability to assign a user to a specific server.<\/li>\n<li>Delegation\u00c2\u00a0: Delegation allows local administrators or supervisors to perform system modifications without a global administrator or for one user to allow another to perform actions on their behalf. For example, a user could delegate the right to manage office-related information.<\/li>\n<li>Interchange: The\u00c2\u00a0SAML\u00c2\u00a0protocol\u00c2\u00a0is a prominent means used to exchange identity information between two identity domains.\u00c2\u00a0OpenID Connect\u00c2\u00a0is another such protocol.<\/li>\n<\/ul>\n<p>Okta sells 10 products,\u00c2\u00a0including Single Sign-On, Universal Directory, Advanced Server Access (formerly ScaleFT), API Access Management, Authentication, User Management, B2B Integration, Multi-factor Authentication, Lifecycle Management, and Access Gateway.<\/p>\n<p>Okta sells six services, including a\u00c2\u00a0single sign-on\u00c2\u00a0service that allows users to log into a variety of systems using one centralized process. For example, the company claims the ability to log into\u00c2\u00a0Gmail,\u00c2\u00a0Workday,\u00c2\u00a0Salesforce\u00c2\u00a0and\u00c2\u00a0Slack\u00c2\u00a0with one login.\u00c2\u00a0It also offers\u00c2\u00a0API\u00c2\u00a0authentication services.<\/p>\n<p>Okta&#8217;s services are built on top of the\u00c2\u00a0Amazon Web Services\u00c2\u00a0cloud.<\/p>\n<p>Okta primarily targets enterprise businesses. Claimed customers as of 2020 include\u00c2\u00a0Zoominfo,\u00c2\u00a0JetBlue,\u00c2\u00a0Nordstrom,\u00c2\u00a0MGM Resorts International, and the\u00c2\u00a0U.S. Department of Justice.<\/p>\n<p>Okta runs an annual \u00e2\u20ac\u0153Oktane\u00e2\u20ac\u009d user conference, which in 2018 featured former\u00c2\u00a0US President\u00c2\u00a0Barack Obama\u00c2\u00a0as a keynote speaker.<\/p>\n<p>Okta was co-founded in 2009 by Todd McKinnon and Frederic Kerrest, who previously worked together at\u00c2\u00a0Salesforce.<\/p>\n<p>In 2015, the company raised US$75 million in venture capital from\u00c2\u00a0Andreessen Horowitz,\u00c2\u00a0Greylock Partners, and\u00c2\u00a0Sequoia Capital, at a total initial valuation of US$1.2 billion.<\/p>\n<p>In 2017, Okta&#8217;s initial public offering priced at $17.00 per share, trading up on its first day, to raise an additional US$187 million.\u00c2\u00a0At the time of its IPO,\u00c2\u00a0Sequoia Capital\u00c2\u00a0was the biggest shareholder, with a 21.2 percent stake.<\/p>\n<p>In January 2019, Okta&#8217;s CEO announced that the company has over 100 million registered users.<\/p>\n<p>In August 2020, Okta announced that it plans to let most of its employees work remotely on a permanent basis as a result of the COVID-19 pandemic.<\/p>\n<p>In March 2021, Okta signed a definitive agreement to acquire Auth0 for $6.5 billion.\u00c2\u00a0In May 2021, Okta\u00e2\u20ac\u2122s acquisition of Auth0 closed.<\/p>\n<p>The above is a brief about Okta. Watch this space for more updates on the latest trends in Technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Okta, Inc.\u00c2\u00a0(formerly\u00c2\u00a0Saasure Inc.) is an<\/p>\n","protected":false},"author":1,"featured_media":1626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[901,900,7],"tags":[903,902,18],"class_list":["post-1624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-and-access-management","category-okta","category-techtrends","tag-identity-and-access-management","tag-okta","tag-technology"],"_links":{"self":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts\/1624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/comments?post=1624"}],"version-history":[{"count":2,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts\/1624\/revisions"}],"predecessor-version":[{"id":1627,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts\/1624\/revisions\/1627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/media\/1626"}],"wp:attachment":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/media?parent=1624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/categories?post=1624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/tags?post=1624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}