0%

Plan, design, and implement identity and access management solutions with Okta

Key Features

  • Learn how to use Okta for complete identity and access management in your organization
  • Use single sign-on, multifactor authentication, and life cycle management for enhanced security
  • Set up, manage, and audit API access policies

Book Description

IAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you'll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers.

Once you've understood how Okta can be used as an IAM platform, you'll learn about the Universal Directory, which covers how to integrate other directories and applications and set up groups and policies. As you make progress, the book explores Okta's single sign-on (SSO) feature and multifactor authentication (MFA) solutions. Finally, you will delve into API access management and discover how you can leverage Advanced Server Access for your cloud servers and Okta Access Gateway for your on-premises applications.

By the end of this Okta book, you'll have learned how to implement Okta to enhance your organization's security and be able to use this book as a reference guide for the Okta certification exam.

What you will learn

  • Understand different types of users in Okta and how to place them in groups
  • Set up SSO and MFA rules to secure your IT environment
  • Get to grips with the basics of end-user functionality and customization
  • Find out how provisioning and synchronization with applications work
  • Explore API management, Access Gateway, and Advanced Server Access
  • Become well-versed in the terminology used by IAM professionals

Who this book is for

If you are an IT consultant, business decision-maker, system administrator, system and security engineer, or anyone who wishes to use Okta to plan, design, and implement identity and access management solutions, this book is for you. A basic understanding of authentication and authorization is necessary.

Table of Contents

  1. Okta Administration: Up and Running
  2. Why subscribe?
  3. Contributors
  4. About the authors
  5. About the reviewers
  6. Packt is searching for authors like you
  7. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
    4. Download the color images
    5. Conventions used
    6. Get in touch
    7. Reviews
  8. Section 1: Getting Started with Okta
  9. Chapter 1: IAM and Okta
    1. Exploring the origins of Okta
    2. Understanding IAM and Okta
    3. Exploring Okta
    4. Zero trust
    5. Discovering Okta's basic features
    6. Universal Directory
    7. Single sign-on
    8. Multi-factor authentication and adaptive multi-factor authentication
    9. Lifecycle management
    10. Workflows
    11. Okta's advanced features
    12. Okta Advanced Server Access
    13. Okta Access Gateway
    14. API Access Gateway
    15. Summary
  10. Chapter 2: Working with Universal Directory
    1. Directory integrations
    2. Microsoft AD integration
    3. LDAP integration
    4. Everything about users
    5. Using groups
    6. Types of groups in Okta
    7. Using AD groups
    8. Creating users in AD through Okta groups
    9. Pushing groups
    10. Deleting groups
    11. Assigning applications to groups
    12. Some best practices for group usage
    13. Summary
  11. Chapter 3: Single Sign-On for a Great End User Experience
    1. Using Single Sign-On with Okta
    2. Password policies
    3. Sign-on policies
    4. Using the Okta dashboard and Okta Mobile app
    5. The Okta Mobile app
    6. Simpler administration with Okta Integration Network
    7. Basic integration with Secure Web Authentication
    8. SWA with the AIW
    9. Using SAML and OpenID Connect applications
    10. Managing inbound SSO
    11. IdP discovery
    12. Summary
  12. Chapter 4: Increasing Security with Adaptive Multi-Factor Authentication
    1. Different types of factors
    2. Knowledge factors
    3. Possession factors
    4. Biometric factors
    5. Basic MFA settings
    6. Contextual access management
    7. Dynamic application access
    8. Setting up network zones
    9. Behavior detection
    10. Creating layered and app-specific policies
    11. Enrolling end users in MFA
    12. Resetting multifactor
    13. Securing a VPN with MFA
    14. Summary
  13. Chapter 5: Automating Using Life Cycle Management
    1. Automating user provisioning
    2. Provisioning users
    3. Provisioning rich profiles
    4. Keeping track of attributes with Attribute Mapping
    5. Attribute magic with Okta Expression Language
    6. Setting up group rules
    7. Setting up self-service options
    8. Using workflow capabilities
    9. Inline Hooks
    10. Event Hooks
    11. Automation
    12. Using Okta Workflows
    13. Your first Workflows contact
    14. Okta Workflows automation flows
    15. Platform features
    16. Summary
  14. Chapter 6: Customizing Your Okta GUI
    1. Understanding the basics of end user functionality and customization
    2. Visual end user settings
    3. The end user dashboard and Okta plugin settings
    4. Admin settings for the dashboard
    5. Okta plugin settings
    6. Custom domain setup and custom page creation
    7. Customizing the sign-in page
    8. Custom notification templates
    9. Summary
  15. Section 2: Extending Okta
  16. Chapter 7: API Management
    1. API terminology
    2. Managing Okta with APIs
    3. Using Okta's own APIs
    4. Rate limits
    5. API Access Management fundamentals
    6. Level 1 – no security
    7. Level 2 – using API keys
    8. Level 3 – OAuth 2.0
    9. Level 4 – API gateways
    10. Level 5 – API gateways and API Access Management
    11. API Access Management administration
    12. Authorization server
    13. Key rotation
    14. Summary
  17. Chapter 8: Managing Access with Advanced Server Access
    1. ASA – a high-level overview
    2. So, how does this work?
    3. Setting up ASA
    4. Installing ASA
    5. Enrolling a server
    6. ASA client
    7. Managing your ASA environment
    8. Managing projects
    9. Automation
    10. Summary
  18. Chapter 9: Leveraging Access Gateway for Your On-Premises Applications
    1. Access Gateway overview
    2. How to deploy Access Gateway
    3. Implementing a header-based application
    4. Administrating Okta Access Gateway
    5. Summary
  19. Other Books You May Enjoy
    1. Leave a review - let other readers know what you think
3.17.6.75