You never want Identity to be a barrier between you and your customers. But Okta’s recent Customer Identity Trends Report found that:
33% of respondents indicated feeling frustrated when they have to create a password that meets specific requirements
63% of respondents report that at least once a month, they’re unable to log in to an account…
For business leaders today, there’s no hotter topic than artificial intelligence (AI).
Executives everywhere are asking themselves — and each other — how AI will transform the products they offer, the ways they work, and the threats they face.
Our new analysis, AI at Work 2024: C-suite perspectives on artificial intelligence, paints a picture of…
This blog post will teach you how to set up output fields on an API connector action in the Okta Workflows Connector Builder. Your card will look like this:
The Weather – Current card.
Create API connector tutorials.
Set up API connector output fields.
Resources.
Create API connector tutorials
We wrote two tutorials about building API connectors…
Recapping features introduced under the Okta Secure Identity Commitment to safeguard our infrastructure, our customers, and our customers’ customers
Identity is under attack — by ransomware groups, nation-state actors, malicious insiders, and other cybercriminals — and, in recent years, it has emerged as the primary enterprise security entry point…
At Okta, we endeavour to build a world where everyone can safely use any technology, powered by their identity. Our definition of “everyone” includes people who rely on assistive technology to access and engage with digital products, services, and applications.
This May 16th, Okta joins our partners, customers and the world in acknowledging…
Imagine if you were free. Free from the old ways of doing things. From outdated tools and inefficient workflows, from forgotten passwords and frustrated IT teams. Free from the burdens of bad actors, painful user experiences, and costly security breaches.
What if you were free from all that? What would you focus on instead? What impossible things…
Call it an ace in the hole, a linchpin, or the “secret sauce,” but that’s what extensibility is. It’s the key to ensuring adaptability and scalability in an ever-evolving digital landscape.
Today, we’re excited to share the latest innovation for the Customer Identity Cloud Actions platform: Forms for Actions. We designed this new no-code visual…
Image generated using DALL·E 2
This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organisation’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organisation’s proactive use…
Save with an Identity solution that won’t slow you down as you scale
TL;DR Don’t want to add another web page to the to-read list? We have an easy, on-the-go version here available for immediate download.
The process of building up your app or service involves not just, well, building the app or service, but also the foundational tech you need…
Artificial intelligence (AI), and specifically generative AI (GenAI), is helping jumpstart revolutions in various industries. Unfortunately, some of this technology’s earliest and most aggressive adopters have been cyberattackers. The exponential growth in GenAI capabilities has proven irresistible, allowing even novice criminals to conduct…