Okta is an independent identity provider that focuses primarily on securely connecting individuals to suitable technology. Utilizing the Okta Identity Cloud, the firm eases the secure access to applications and infrastructure providers with its extensive range of pre-built integrations. Satisfying the needs of a variety of organizations, Okta leverages its solutions to safeguard the identities of workforce and customers, helping them attain their potential without fearing identity-related threats. The company operates on the idea that confident individuals and organizations can unlock their full potential when their identities are well-protected.
Do You Manage Peer Insights at Okta?
Access Vendor Portal to update and manage your profile.
Okta security controls cover a lot of bases and provide peace of mind for our IT security needs. They have certainly paved the way for some great functionality in the IAM space, and there is still a great deal of opportunity for them to maintain leadership in the space.
1.) I can build conditional access rules based on users, groups, device state, location, and risk level to tightly control who gets access and when. 2.) Integration with MDM/EMM tools lets me enforce access policies based on device compliance for our desktop and mobile devices. 3.) While it's not a full Data Loss Prevention (DLP) platform, Okta's app level policies, session controls and authentication help reduce data exposure by limiting access and enforcing security at the identity layer.
As someone with a background in programming, I have enjoyed the API. Being able to leverage this has allowed me to perform tasks that prior admins in my org were unable to do, as well as replicate other features in Okta that didn't have an exact one-to-one function in the SKUs we use.
Okta seems to be struggling in the same way as other leaders in their respective tech spaces. As they grow, expand, and acquire similar products to build out their portfolio, they are creating more friction points between those products. The potential for teams to accrue tech debt will continue to grow unless Okta can step in and establish a more consistent experience across the products.
1.) The built in reports are basic and getting deeper insights requires APIs or exporting data to external tools. 2.) While the policy engine does feel powerful, I find creating and managing many conditional access rules becomes cumbersome and hard to track. 3.) Sometimes push notifications or biometric logins in Fail or require repeated retries. This can create friction for end users. And cause extra help desk support requests. More granular policy controls would help with this.
One difficulty with Okta is that there are policies that can end up conflicting with each other if care is not taken when configuring them. This becomes especially challenging when taking over the platform from another administrator. These conflicts are not immediately clear when policies and rules are not given unique names, which impacts the ability to troubleshoot. Another difficulty is that there is not a good way to do a mass reset of groups and group rules without also resetting the rest of the integration. Great care should be taken by the team that is deploying Okta to design the platform with the future in mind. Lastly, the logs take some time to get used to. It helps to have authentication policies and rules have specific, unique names so that you can look at exactly what rule, and what logic in the rule triggers it on a given user.