Okta Workforce Identity Questions

it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Nov 11 2022

Hi Everyone,

What do you like most about Okta Workforce Identity?

Thanks for sharing your thoughts with the community!

ABHILASH TH - PeerSpot reviewer
ABHILASH THEase of use ( with less training ) for the workforce of any and system… more »
28 Answers
Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)
Nov 11 2022

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)
Nov 11 2022

Please share with the community what you think needs improvement with Okta Workforce Identity.

What are its weaknesses? What would you like to see changed in a future version?

it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Nov 11 2022

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)
Nov 11 2022

If you were talking to someone whose organization is considering Okta Workforce Identity, what would you say?

How would you rate it and why? Any other tips or advice?

Identity and Access Management as a Service (IDaaS) (IAMaaS) Questions
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Jul 13 2022

Hi security professionals,

Can you please clarify the definition of the Zero Trust vs Least Privileged model? How are they different?

In which cases you'd use each of them? Please share an example.

Thanks for sharing your knowledge!

Olive Kusumbara - PeerSpot reviewer
Olive KusumbaraLeast Privilege is about giving the least privilege (role and privilege) as… more »
Adewale Oluwaseyi - PeerSpot reviewer
Adewale OluwaseyiLeast privilege access is used to provide access needed to perform a role or… more »
Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriZero Trust is the same approach for all users (for example internal and… more »
3 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

Hi infosec professionals,

Can you share your best practices and advice to follow (by an enterprise) when implementing IAM in the Cloud?

Thanks for your help in educating our community!

Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriIdentity and access management in the cloud - there are more interpretations of… more »
Pramod Bhaskar  - PeerSpot reviewer
Pramod Bhaskar Cloud IAM is a different beast from traditional on-premises IAM. There are… more »
Kemp Zhou - PeerSpot reviewer
Kemp ZhouCase by case, that will be the very first thing I am going to tell.  In… more »
6 Answers
reviewer1740369 - PeerSpot reviewer
User at Jkumar infra

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
Bruce Macdonald - PeerSpot reviewer
Bruce MacdonaldIDAM stands for Identity and Access Management. Think of this as the lifecycle… more »
2 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

Hi community,

How do you practically use it and apply Security Posture/Security Posture Management in a large organization?

Tnx.

Vishal-Goyal - PeerSpot reviewer
Vishal-GoyalSecurity posture will include a number of things. The following artifacts… more »
1 Answer
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services

Hi, 

Which is the best Privileged Account Management solution for an enterprise? Why?

How is the privileged account management solution deployed? Can it work on-premises or in the cloud in physical or virtual environments, hosted on Windows or Linux OS?

Thank you!

NajibulIslam - PeerSpot reviewer
NajibulIslamHi Mr. @Shibu Babuchandran, Previously Mr. Belenky answered it here What is… more »
Bruce Macdonald - PeerSpot reviewer
Bruce MacdonaldHi @Shibu Babuchandran ​, Full disclosure - I am an SE for Hitachi ID so… more »
Nurlan Temirbulatov - PeerSpot reviewer
Nurlan TemirbulatovHello @Shibu Babuchandran, My name is Nurlan and I'm an SE at Remediant, who… more »
6 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

When should an organization use Hybrid Identity? What are the top IAM tools that support it?

Ram Chenna - PeerSpot reviewer
Ram Chenna
Enterprise Architect at Blueray Digital Services
Hello everyone, We are working with an retail client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such as Payment Ga...
Read More »
Joanna Stevens - PeerSpot reviewer
Joanna Stevens@Ram Chenna ​Hi Ram! I would suggest that this is a great place to start… more »
John Johny Restrepo Hernández - PeerSpot reviewer
John Johny Restrepo HernándezOf course, to have the best Identity and Access Management solution it is… more »
Matt Thomson - PeerSpot reviewer
Matt Thomson@Ram Chenna ​ Sounds like there is a lot of things at play here.  I would… more »
13 Answers
Amimesh Anand - PeerSpot reviewer
Amimesh Anand
Senior Associate at a tech services company with 10,001+ employees
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?
Read More »
Samuel Paul - PeerSpot reviewer
Samuel PaulHi @Amimesh Anand, It seems to be important first to analyse the current… more »
CaseyWhitcher - PeerSpot reviewer
CaseyWhitcherI think in your initial interview, and evaluation with the client, the necessity… more »
Jay Bretzmann - PeerSpot reviewer
Jay BretzmannWhat's the issue, expense?  How does one eliminate risk if they can't positively… more »
5 Answers
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services

Hi all,

What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community.

Thanks for sharing your experience!

Evgeny Belenky - PeerSpot reviewer
Evgeny BelenkyHi @Chetan Woodun, @Felician (Felix)Farcutiu, @SIVASHANMUGAM NATARAJAN, @John… more »
1 Answer
Peter Lindroth - PeerSpot reviewer
Peter Lindroth
Infrastructure Architect at Forefront consulting

Hi community members,

I'm researching identity management/identity and access management solutions. 

Are there any good comparison matrices comparing Microsoft Identity Manager to other identity and access management solutions?

Thanks in advance,

Peter

Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

Amimesh Anand - PeerSpot reviewer
Amimesh AnandThere could be 2 types of action that can be taken to measure the data breach… more »
Ahmad Zuhdi - PeerSpot reviewer
Ahmad ZuhdiAbsolutely! IAM is so important to prevent a data breach. With IAM we can make… more »
SteveAndrews - PeerSpot reviewer
SteveAndrewsSince cybercrime is on the aggressive rise, and our organizations working… more »
5 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

What tools can be used to help make GDPR compliance easier? What are some specific features to look out for?

AdrianMache - PeerSpot reviewer
AdrianMacheI would go for RSA SecurID Suite due to strong compliance and continuous fast… more »
Michel Timp - PeerSpot reviewer
Michel TimpI would recommend Okta or HelloID (which includes Account provisioning , Acces… more »
Chris Faist - PeerSpot reviewer
Chris FaistRony - Access management is only a small part of GDPR compliance. GDPR is… more »
5 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

What are pros and cons of each?

Tony Cilibrasi - PeerSpot reviewer
Tony CilibrasiWithout going into too much detail since I'm not an expert in this field myself… more »
John. W. Green - PeerSpot reviewer
John. W. GreenActive Directory is the directory service database to store the… more »
Jean-Francois Richard - PeerSpot reviewer
Jean-Francois RichardLDAP is a directory services protocol. Active Directory is a directory server… more »
3 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

SSO seems like a great way to simplify secure user authentication, but is it safe? If SSO is compromised, surely this poses a greater risk, as then all one's passwords can be accessed across all applications? 

Tom Aafloen - PeerSpot reviewer
Tom AafloenHi all! I do not see SSO purely as authentication. SSO is rather the… more »
José Luis Pozo - PeerSpot reviewer
José Luis PozoSSO is one of the most secure ways to authenticate a user. However, as usual, it… more »
Arun Kumar V - PeerSpot reviewer
Arun Kumar VHi,  Single Sign-On for an application is the most secure way of transition… more »
8 Answers
Ariel Lindenfeld - PeerSpot reviewer
Ariel Lindenfeld
Sr. Director of Community
PeerSpot