On this page
Okta Identity Engine overview
Identity EngineOkta Identity Engine is Okta's new authentication pipeline that provides valuable new features and a more flexible approach to your auth needs. This article provides a high-level introduction.
Below we explain what new features Identity Engine brings to the table, we discuss the deployment models that make use of these features and show how our documentation experience is changing to support it.
Note: If you are an admin, or are looking for product docs related to Identity Engine, see the Identity Engine Get started page (opens new window) over in the Okta Help Center.
Identity Engine new features
Identity Engine unlocks many new capabilities.
App context in email templates
Identity Engine makes the app context available when a user enters an authentication flow. Context variables are available in our email templates, allowing customers to dynamically customize email style and content based on the app that an email notification is triggered from.
See Customize email notifications > Use app context.
App intent links
App intent links are used to signal intent to access an application. These links are protocol-specific endpoints that you can use to initiate a sign-in flow to an application. Both Identity Provider and Service Provider initiated flows are supported.
Example app intent link for a SAML application:
http://${yourOktaDomain}/app/mysamlapp_1/${appInstanceID}/sso/saml
Prior to Okta Identity Engine, these endpoints were accessible only with a session. Unauthenticated traffic was redirected to a centralized sign-in page (/login/login.htm
) with a fromUri
that represented the app that was originally attempted (the app intent link). This occurred before the request was assessed for rate limiting. A session was established and the request was processed. The user was then redirected to the relevant app intent link through an intermediate redirect to the generic app single-sign on endpoint (/app/${app}/${instanceId}/${linkName}
). The app intent link endpoint validated that the user was assigned to the application, and then enforced the app sign-on policy.
Okta Identity Engine changed the way Okta processes these requests. Identity Engine no longer forwards requests to the centralized sign-in page (/login/login.htm
). Instead, the app intent links location hosts the widget/sign-in experience for the app that the user is attempting to access and evaluate the Global Session Policy, authentication policy, and all other policies relevant to the sign-in experience. Since each app intent link is responsible for hosting the sign-in experience on Identity Engine, they share a common app intent link rate limit bucket/group similar to what existed for the centralized sign-in page on Classic Engine.
Authentication policies
Authentication policies are security policy frameworks (opens new window) that allow organizations to model security outcomes for an app. These policies are shareable across applications. For example, you can automatically step up authentication to a strong non-phishable factor when elevated risk is detected. Additionally, Identity Engine allows you to create flexible apps that can change their authentication methods without having to alter a line of code.
CAPTCHA
CAPTCHA is a well-known strategy for mitigating attacks by bots. Identity Engine offers registration, sign-in, and account recovery integration of the two market-leading CAPTCHA services: hCAPTCHA (opens new window) and reCAPTCHA (opens new window). These are usable through the Okta-hosted and embedded Sign-In Widgets, but not SDKs.
Interaction code grant type for embedded authentication
To enable a more customized user authentication experience, Okta introduces an extension to the OAuth 2.0 and OpenID Connect standard called the Interaction Code grant type. This grant type allows apps using an embedded Okta Sign-In Widget and/or SDK to manage user interactions with the authorization server directly, rather than relying on a browser-based redirect to an authentication component (such as the Sign-In Widget).
Authentication deployment models
You can divide the Identity Engine user authentication deployment model into three approaches:
- Okta-hosted (redirect) Sign-In Widget: Use the redirect (Okta-hosted) Sign-In Widget to authenticate your users, then redirect back to your app. This is the recommended approach as it's the most secure and fastest to implement.
- Embedded Sign-In Widget: Embed the Sign-In Widget into your own code base to handle the authentication on your servers. This provides a balance between complexity and customization.
- Embedded SDK-driven sign-in flow: Use our SDKs to create a completely custom authentication experience. This option is the most complex and leaves you with the most responsibility, but offers the most control.
See Okta deployment models — redirect vs. embedded for an overview of the different deployment models, and see Sign users in for practical implementation details.
SDKs and sample apps
We have a whole host of SDKs available for integrating new Identity Engine features into your apps using the deployment models described above and sample apps to show them in action.
Identity Engine versus Classic Engine documentation approach
In our documentation, we are moving towards supporting Identity Engine by default, while still providing information for Classic Engine users.
- Pages and page sections covering features that only work in Identity Engine have a blue Identity Engine banner at the top.
- Content that works in both Identity Engine and Classic Engine have no banner. Any slight differences are covered in the page text.
- Content written for Classic Engine, that won't work in Identity Engine, has a note at the top that explains what the issue is, and, if appropriate, where Identity Engine users can go to find support.
- For guides that were extensively updated to support Identity Engine, we keep the Classic Engine version in the Okta Classic Engine section, so it's still accessible if needed.
Note: See Identify your Okta solution (opens new window) to determine your Okta version.
Access and upgrade to Identity Engine
On March 1, 2022, all new Okta orgs are Identity Engine orgs, so that all new customers can take advantage of the new features.
If you are a Classic Engine customer who wants to upgrade their apps to use Identity Engine, go to Identity Engine upgrade overview.
For Classic Engine customers who don't yet want to upgrade, your existing functionality continues to work for now, including your Classic Engine org, v1 API, and SDKs.