Check out the free virtual workshops on how to take your SaaS app to the next level in the enterprise-ready identity journey!

Add Step-up Authentication Using Angular and NestJS

Add Step-up Authentication Using Angular and NestJS

The applications you work on expect good authentication as a secure foundation. In the past, we treated authentication as binary. You are either authenticated or not. You had to set the same authentication mechanism for access to your application without a standard way to change authentication mechanisms conditionally. Consider the case where sensitive actions warrant verification, such as making a large financial transaction or modifying top-secret data. Those actions require extra scrutiny! Use Step Up...

Read more

The End of Third-Party Cookies

The End of Third-Party Cookies

What are third-party cookies? Cookies are as old as the internet. Historically, cookies were among the only options for personalizing a user’s online experience and carrying their preferences from page to page. First-party cookies are issued by the web site where they’re used, and third-party cookies come from other domains. Third-party cookies allow user behavior to be tracked across different sites. These cookies are now widely abused to collect and share users’ data. For the...

Read more

How to Manage User Lifecycle with .NET and SCIM

How to Manage User Lifecycle with .NET and SCIM

Several challenges exist in provisioning users for a growing company across systems and applications. It can be time-consuming, error-prone, challenging to sync users across domains, and potentially a security risk to keep track of existing profiles. Fortunately, a protocol called SCIM (System for Cross-domain Identity Management) standardizes user information across systems, making it possible to sync users. Also, combined with a SCIM-compliant Identity Provider (IdP), it securely automates common user lifecycle operations. In this tutorial,...

Read more

Flexible Authentication Configurations in Angular Applications Using Okta

Flexible Authentication Configurations in Angular Applications Using Okta

Are you ready to hear about the ultimate flexibility in configuring authentication properties in the Okta Angular SDK? You’ll want to check out this excellent new feature and walk through the steps of adding authentication using Okta to Angular applications. Configuring authentication properties using Okta in Angular applications There are three main ways you can add configuration information to Angular applications: Define the value within the app - The easiest, most straightforward route is directly...

Read more

How I Built an Okta Documentation Chatbot in Python

How I Built an Okta Documentation Chatbot in Python

In today’s fast-paced world of technology, developers must navigate through detailed API documentation to integrate with software solutions. As a Developer Support Intern at Okta, I noticed developers underutilizing Okta’s Developer Documentation. To help them benefit from the wealth of information in these docs, I was inspired to build a tool using OpenAI. Leveraging ChatGPT, I built ✨Oktanaut✨, a versatile Python chatbot running on Jupyter Notebook that makes access to information on Okta’s Developer Documentation...

Read more

Winners of the AI and Identity Okta Hackathon 2023

Winners of the AI and Identity Okta Hackathon 2023

In late September, in partnership with DevPost, we announced the AI and Identity - Okta Hackathon 2023, and invited developers across the globe to “build an app that integrates identity standards with a flair of AI.” We were excited to see how participants would respond to the challenge, and we were not disappointed! Consider these key numbers: Total Hackathon Registrants: 576 Total App Submissions: 22 Total Eligible Submissions: 9 At the close of the competition...

Read more

Step-Up Authentication Examples With Okta

Step-Up Authentication Examples With Okta

Step-up Authentication with Okta Workforce Identity Cloud Step-up authentication in an application is a pattern of allowing access to non-critical resources using basic level of authentication, and requiring additional authentications for critical resources. This has the effect of providing a balance between frictionless user experience and security in an application. There are several methodologies to provide the functionality as discussed here. In this article we will explore few ways Okta Workforce Identity Cloud (WIC) can...

Read more

Why You Should Migrate to OAuth 2.0 From Static API Tokens

Why You Should Migrate to OAuth 2.0 From Static API Tokens

Static API tokens have long been used to call external APIs and access the resources of third parties such as software vendors. As API standards have evolved, OAuth 2.0 emerged as the option offering more robust security, greater flexibility, and a better developer experience. Let’s explore the advantages of moving away from static tokens in favor of OAuth 2.0. Table of Contents Static API token landscape Shift from static API tokens to OAuth 2.0 for...

Read more

Enterprise Ready Workshop: Automate with no-code Okta Workflows

Enterprise Ready Workshop: Automate with no-code Okta Workflows

This tutorial is part of the on-demand workshop series. In this workshop, you’ll enhance the base Todo application by creating an automated report using Okta’s no-code Workflows platform. Table of Contents What is Okta Workflows? Getting access to Okta Workflows Creating a flow Okta Workflows building blocks Setting up the Todo application Enhancing the Todo application with a new API Launching the API in a local tunnel Building the Todo Report flow Updating the flow...

Read more

We're Living in a Passwordless World

We're Living in a Passwordless World

Passwords? Bah! Who wants to remember all those letter, number, and special character combinations? Password managers and password manager browser extensions can help us, but what if we stopped using passwords entirely? What if we stopped using authentication factors, such as SMS one-time passwords (OTP), that pose risks where malicious actors can access sensitive authentication information (phishing)? What if authentication was so seamless that we could use built-in device hardware capabilities instead? Seamless, easy-to-use authentication...

Read more

Page: 1 of 74 Next »