Okta Administration Up and Running: Drive operational excellence with IAM solutions for on-premises and cloud apps, 2nd Edition

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructions Key Features Discover how to use Okta for complete identity and access management in your organization Explore agentless desktop single sign-on, multifactor authentication, and lifecycle management for enhanced security Learn about no-code and low-code automation functionalities, also known as Okta Workflows Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIdentity and access management (IAM) is a set of policies and technologies used to ensure an organization's security, by carefully assigning roles and access to users and devices. This book will get you up and running with Okta, an IAM service that can help you manage both employees and customers. The book begins by helping you understand how Okta can be used as an IAM platform, before teaching you about Universal Directory and how to integrate with other directories and apps, as well as set up groups and policies for Joiner, Mover, and Leaver flows. This updated edition helps you to explore agentless desktop single sign-on (SSO) and multifactor authentication (MFA) solutions, and showing how to utilize Okta to meet NIST requirements. The chapters also walk you through Okta Workflows, low-/no-code automation functionalities, and custom API possibilities used to improve lifecycle management. Finally, you'll delve into API access auditing and management, where you'll discover how to leverage Advanced Server Access (ASA) for your cloud servers. By the end of this book, you'll have learned how to implement Okta to enhance your organization's security and be able to use the book as a reference guide for the Okta certification exam.What you will learn Get a clear overview of Okta's advanced features Integrate Okta with directories and applications using hands-on instructions Get practical recommendations on managing policies for SSO, MFA, and lifecycle management Discover how to manage groups and group rules for Joiner, Mover, Leaver events in Okta using examples Manage your Okta tenants using APIs and oversee API access with Okta Set up and manage your organization's Okta environment, ensuring a secure IAM practice Find out how to extend your Okta experience with Workflows and ASA Who this book is for If you are an IT consultant, business decision-maker, system administrator, system and security engineer, or anyone looking to use Okta to plan, design, and implement identity and access management solutions, this book is for you. A basic understanding of authentication and authorization is necessary to understand the topics present in this book. ]]>

Author(s): Lovisa Stenbäcken Stjernlöf, HenkJan de Vries
Edition: 2
Publisher: Packt
Year: 2023

Language: English
Pages: 306

Cover
Cover
Title Page
Copyright and Credit
Dedication
Contributors
Table of Contents
Preface
Part 1:Getting Started with Okta
Chapter 1: IAM and Okta
Exploring the origins of Okta
Understanding IAM and Okta
Exploring Okta
Zero trust
Discovering the basic features of Okta
Universal Directory
Single sign-on
Multifactor authentication and adaptive multifactor authentication
Lifecycle management
Advanced features of Okta
Okta Advanced Server Access
Workflows
Okta Access Gateway
API Access Gateway
Okta and NIST
Summary
Chapter 2: Working with Universal Directory
Directory integrations
Microsoft AD integration
LDAP integration
Everything about users
Using groups
Types of groups in Okta
Using AD groups
Creating users in AD through Okta groups
Pushing groups
Deleting groups
Assigning applications to groups
Some best practices for group usage
Overview of devices
Registering a device
Summary
Chapter 3: Using Single Sign-On for a Great End User Experience
Using single sign-on with Okta
Understanding global session policies
Using the Okta dashboard
Setting up Agentless Desktop single sign-on
Simplifying administration with the Okta Integration Network
Setting up a basic integration with Secure Web Authentication
SWA with the App Integration Wizard
Using SAML and OpenID Connect applications
Managing inbound SSO
IdP discovery
Summary
Chapter 4: Increasing Security with Adaptive Multifactor Authentication
Factor types
Knowledge factors
Possession factors
Biometric factors
Authenticators and enrollment
Knowledge factors
Possession factors
Biometric factors
MFA enrollment
Contextual access management
Device security signals
Integrating with MDM
Setting up network zones
Behavior detection
Enrolling end users in MFA
Resetting authenticators
Securing a VPN with MFA
Summary
Chapter 5: Automating Using Lifecycle Management
Automating user provisioning
Provisioning users
Sourcing users
Provisioning rich profiles
Keeping track of attributes with attribute mapping
Attribute magic with Okta Expression Language
Setting up group rules
Setting up self-service options
Summary
Chapter 6: Customizing Your Okta GUI
Understanding the basics of end user functionality
Customizations and the branding of your Okta
The Okta plugin settings
Summary
Part 2: Extending Okta
Chapter 7: Okta Workflows
What Okta Workflows is
Using workflow capabilities
Using Okta Workflows
Your first Workflows contact
Okta Workflows flows
Platform features
App integrations
The Workflows Connector builder
Templates
Exporting workflows
Delegated admin workflows
Summary
Chapter 8: API Access Management
API terminology
Managing Okta with APIs
Using Okta’s APIs
Rate limits
Fundamentals of API Access Management
Level 1 – no security
Level 2 – using API keys
Level 3 – OAuth 2.0
Level 4 – API gateways
Level 5 – API gateways and API Access Management
API access administration
Authorization server
Key rotation
Summary
Chapter 9: Managing Access with Advanced Server Access
ASA – a high-level overview
How ASA works
Setting up ASA
Configuring ASA
Enrolling a server
ASA client
Setting up gateways
Session capturing
AD-joined advanced capabilities
Managing your ASA environment
Managing projects
Automation
Summary
Index
Other Books You May Enjoy