1 option
Okta Administration up and Running : Drive Operational Excellence with IAM Solutions for on-Premises and Cloud Apps / HenkJan de Vries and Lovisa Stenbäcken Stjernlöf.
- Format:
- Book
- Author/Creator:
- Vries, HenkJan de, author.
- Stjernlöf, Lovisa Stenbäcken, author.
- Language:
- English
- Subjects (All):
- Cloud computing.
- Computer networks.
- Physical Description:
- 1 online resource (306 pages)
- Edition:
- Second edition.
- Place of Publication:
- Birmingham, England : Packt Publishing Ltd., [2023]
- Summary:
- Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructions Key Features Discover how to use Okta for complete identity and access management in your organization Explore agentless desktop single sign-on, multifactor authentication, and lifecycle management for enhanced security Learn about no-code and low-code automation functionalities, also known as Okta Workflows Purchase of the print or Kindle book includes a free PDF eBook Book Description Identity and access management (IAM) is a set of policies and technologies used to ensure an organization's security, by carefully assigning roles and access to users and devices. This book will get you up and running with Okta, an IAM service that can help you manage both employees and customers. The book begins by helping you understand how Okta can be used as an IAM platform, before teaching you about Universal Directory and how to integrate with other directories and apps, as well as set up groups and policies for Joiner, Mover, and Leaver flows. This updated edition helps you to explore agentless desktop single sign-on (SSO) and multifactor authentication (MFA) solutions, and showing how to utilize Okta to meet NIST requirements. The chapters also walk you through Okta Workflows, low-/no-code automation functionalities, and custom API possibilities used to improve lifecycle management. Finally, you'll delve into API access auditing and management, where you'll discover how to leverage Advanced Server Access (ASA) for your cloud servers. By the end of this book, you'll have learned how to implement Okta to enhance your organization's security and be able to use the book as a reference guide for the Okta certification exam. What you will learn Get a clear overview of Okta's advanced features Integrate Okta with directories and applications using hands-on instructions Get practical recommendations on managing policies for SSO, MFA, and lifecycle management Discover how to manage groups and group rules for Joiner, Mover, Leaver events in Okta using examples Manage your Okta tenants using APIs and oversee API access with Okta Set up and manage your organization's Okta environment, ensuring a secure IAM practice Find out how to extend your Okta experience with Workflows and ASA Who this book is for If you are an IT consultant, business decision-maker, system administrator, system and security engineer, or anyone looking to use Okta to plan, design, and implement identity and access management solutions, this book is for you. A basic understanding of authentication and authorization is necessary to understand the topics present in this book.
- Contents:
- Cover
- Cover
- Title Page
- Copyright and Credit
- Dedication
- Contributors
- Table of Contents
- Preface
- Part 1: Getting Started with Okta
- Chapter 1: IAM and Okta
- Exploring the origins of Okta
- Understanding IAM and Okta
- Exploring Okta
- Zero trust
- Discovering the basic features of Okta
- Universal Directory
- Single sign-on
- Multifactor authentication and adaptive multifactor authentication
- Lifecycle management
- Advanced features of Okta
- Okta Advanced Server Access
- Workflows
- Okta Access Gateway
- API Access Gateway
- Okta and NIST
- Summary
- Chapter 2: Working with Universal Directory
- Directory integrations
- Microsoft AD integration
- LDAP integration
- Everything about users
- Using groups
- Types of groups in Okta
- Using AD groups
- Creating users in AD through Okta groups
- Pushing groups
- Deleting groups
- Assigning applications to groups
- Some best practices for group usage
- Overview of devices
- Registering a device
- Chapter 3: Using Single Sign-On for a Great End User Experience
- Using single sign-on with Okta
- Understanding global session policies
- Using the Okta dashboard
- Setting up Agentless Desktop single sign-on
- Simplifying administration with the Okta Integration Network
- Setting up a basic integration with Secure Web Authentication
- SWA with the App Integration Wizard
- Using SAML and OpenID Connect applications
- Managing inbound SSO
- IdP discovery
- Chapter 4: Increasing Security with Adaptive Multifactor Authentication
- Factor types
- Knowledge factors
- Possession factors
- Biometric factors
- Authenticators and enrollment
- MFA enrollment
- Contextual access management
- Device security signals
- Integrating with MDM.
- Setting up network zones
- Behavior detection
- Enrolling end users in MFA
- Resetting authenticators
- Securing a VPN with MFA
- Chapter 5: Automating Using Lifecycle Management
- Automating user provisioning
- Provisioning users
- Sourcing users
- Provisioning rich profiles
- Keeping track of attributes with attribute mapping
- Attribute magic with Okta Expression Language
- Setting up group rules
- Setting up self-service options
- Chapter 6: Customizing Your Okta GUI
- Understanding the basics of end user functionality
- Customizations and the branding of your Okta
- The Okta plugin settings
- Part 2: Extending Okta
- Chapter 7: Okta Workflows
- What Okta Workflows is
- Using workflow capabilities
- Using Okta Workflows
- Your first Workflows contact
- Okta Workflows flows
- Platform features
- App integrations
- The Workflows Connector builder
- Templates
- Exporting workflows
- Delegated admin workflows
- Chapter 8: API Access Management
- API terminology
- Managing Okta with APIs
- Using Okta's APIs
- Rate limits
- Fundamentals of API Access Management
- Level 1 - no security
- Level 2 - using API keys
- Level 3 - OAuth 2.0
- Level 4 - API gateways
- Level 5 - API gateways and API Access Management
- API access administration
- Authorization server
- Key rotation
- Chapter 9: Managing Access with Advanced Server Access
- ASA - a high-level overview
- How ASA works
- Setting up ASA
- Configuring ASA
- Enrolling a server
- ASA client
- Setting up gateways
- Session capturing
- AD-joined advanced capabilities
- Managing your ASA environment
- Managing projects
- Automation
- Index
- Other Books You May Enjoy.
- Notes:
- Includes index.
- Description based on print version record.
- ISBN:
- 9781837634521
- 1837634521
- OCLC:
- 1411306878
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.