Intergated on-prem and cloud applications on multi-tier domains and user identity accessing applications hosted on cross domains. Full fleged automation using AD and Okta groups for app assignment.
Lifecycle Management of apps on our Okta tenant.
Intergated on-prem and cloud applications on multi-tier domains and user identity accessing applications hosted on cross domains. Full fleged automation using AD and Okta groups for app assignment.
Lifecycle Management of apps on our Okta tenant.
1. Active Directory Sync, as its useful for pre-assigning apps, can also be used for de-provisioning apps for exiting users
2. Shared apps with common password can now be managed centrally without revealing the credentials
3. User and Apps Management
4. Desktop Single Sign On
5. Auto-provisioning
6. Flexibility to integrate In-house applications
7. Password Self Service
8. Support non-domain users
9. Group based app assignment (okta, AD, pushgroup)
10. Adaptive MFA
11. Workflow for app requests
Command line access
Reporting
Since 2015
It's very stable we have 99.999% uptime on the base
Very high and secure, we have more than 170+ apps secured for sso
Customer Service:
9 out of 10
Technical Support:
9 out of 10
Yes, we had previously used a different solution which was replaced by Okta. Non-scalability was the major drawback of our previous solution.
Initial setup is straightforward, simple and easy to manage
Some apps needed assistance from Okta support team.
Setup is simple if you are an AD admin, cost comparison is nominal compared secured access
KB article from Okta is very detailed just spend some time on the okta
The primary use case of this solution is for access management, multi-integration, and passwordless access.
The most valuable feature of this solution for most customers is access management.
There are also some different views on Biometrics.
This solution would be improved by adding more biometrics features. One example is Cyberside Biometrics.
The technical support is good but needs to improve in their response time.
In the next release, I would like to see biometrics, multi-factor authentication, and to rely more on the mobile or something different on CyberSide.
I have been using this solution for one year.
Normally we deploy it on public Cloud, so it should be scalable.
I have been told that it's quite easy to integrate on Cloud. The scalability then depends on the third-party Cloud provider.
Our latest customers have over two hundred thousand users in a medium-sized company.
The technical support is good but not very responsive regarding my needs in getting details. They are difficult to reach and to get them involved.
I was not a part of the initial setup, but the feedback that I received was that the initial setup was quite straightforward.
Normally we do the implementation ourselves. We are one of the largest integrators worldwide.
My advice to others is to be aware of their current infrastructure.
The integration points have to be very clear to the customer to facilitate the main integration. Otherwise, it makes things very complex.
I would rate this solution an eight out of ten.
We primarily use the solution to access cloud solutions and VDI.
The most valuable aspects of the solution are the integration with external websites one-factor authentication.
The solution lacks an on-premises deployment model so it can't offer a hybrid solution. It would be ideal if clients had options that weren't just cloud-based.
The stability of the solution is fine.
I've never contacted technical support. I've only ever used web pages to assist me with questions, and that has been enough.
We previously used Workspace One Access Solutions from VMware. In fact, we're using it as well as Okta, so we never really switched.
The initial setup is almost completely straightforward. The identity action is complex, so it makes it just a bit difficult.
Customers should use an integrator to help assist in the initial setup.
This solution is very good. Okta is, in my opinion, one of the leaders at the moment on the Polish market. However, there is some limited usability because of the requirements.
We use the cloud deployment model.
I'd rate the solution nine out of ten.
Okta improved both organizations where I've worked with it:
Okta's great for their federation capabilities where it lets the IT team enable business with anyone using common federation features across SaaS, PaaS, IaaS, and internal applications. The Multi-Factor Authentication capability lets you address one of the biggest challenges around security - MFA to make it hard for adversaries to get into your systems.
Better multi-factor authentication integration and support, it's around v2.0 and will need a 3.0 release for maturity.
We use it as an SSO hub for applications to be added/removed from users' profiles and troubleshooting, as well as an active directory.
I work at a service desk providing IT support to PayU international and Naspers.
It made things a lot easier, especially with passwords. You have one password that you have to remember, not a thousand for each application that you use for work.
We can have all our applications in one central base where you can log into it and access it without having to enter your password for each application. This is because it saves your credentials and updates them accordingly.
On the admin side, we can create our own passwords instead of generating one, which is usually difficult to explain to a user. Otherwise, the application is pretty awesome.
We used this solution for provisioning more than one and a half LAC users and integrating more than 300 applications. SSO and MFA has been implemented on almost all applications. MFA options used: RSA token, Okta Verify, etc.
Integrating more than 300 applications is quite tough. With the help of Okta and its outstanding user friendly UI, things went fairly easily.
RESTful Web Service calls and their response seem a bit slow.
Okta is not just an identity provider (IdP) since, with the help of SAML, it can also be a service provider (SP), which then allows it to integrate with a different identity provider. In other words, it provides SSO. In my organization, we use Okta as a centralized solution for our multiple platforms. With just one login users are able to access any associated platforms without having to log in multiple times.
All our logins work seamlessly without having to log in multiple times. With multiple applications, you tend to forget your credentials for some of the applications. Some applications have different password policies. With Okta, all of these is centralized. You only need one password, one setup, one policy and one login.
Other than Okta being an easy and awesome integration tool, one of the best features it has is the provisioning and deprovisioning, which makes management way easier. You don't need to be too technical to understand how it works.
They also have a good knowledge base that helps end-user to self-serve.
Maybe the interface could use some work but, for the most part, the tool is pretty cool.
I rate Okta 10 out of 10 for being an awesome IdP. The API alone is amazing, not to mention the features and integration they have. Compare to other IdPs, Okta uses a dashboard that displays all the associated/linked services, which is really helpful when you have multiple services. It's really an easy tool and their support is great.
We use Okta primarily for user-provisioning and as an SSO portal for access to our applications.
Our organization has a fairly high turnover rate so having an automated process for provisioning and de-provisioning of accounts saves a lot of time from an administration perspective.
The feature that is most valuable to me is the automated user provisioning that we set up using Okta as a major part of that process. We put the process in to save time and increase accuracy in the user-provisioning process. Most everything is driven from our HR system thereby limiting manual input and duplication of work when provisioning accounts. Accounts are disabled as soon as the account is terminated in the HR system.
We still had to write several internal programs/scripts to complete the user-provisioning process. Okta does not have the ability to provision mailbox accounts for on-premise Exchange or in a hybrid O365 environment. The Group Push function from Okta to AD did not work reliably in our environment.
In terms of rating Okta, it is always hard for me to say, as I have not used any other product to perform the functions we use Okta for, so I really don’t have a comparison. There are some things that Okta does very well – SSO being one of those so for that part I would rate it as a nine or 10 out of 10. For the provisioning part, we did have several issues that we have to work through, so for that aspect, I would rate it somewhere around a six to eight out of 10.
