Okta Administration up and Running Drive Operational Excellence with IAM Solutions for on-Premises and Cloud Apps

Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructions Key Features Discover how to use Okta for complete identity and access management in your organization Explore ag...

Descripción completa

Detalles Bibliográficos
Otros Autores: Vries, HenkJan de, author (author), Stjernlöf, Lovisa Stenbäcken, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing Ltd [2023]
Edición:Second edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009790336306719
Tabla de Contenidos:
  • Cover
  • Cover
  • Title Page
  • Copyright and Credit
  • Dedication
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Getting Started with Okta
  • Chapter 1: IAM and Okta
  • Exploring the origins of Okta
  • Understanding IAM and Okta
  • Exploring Okta
  • Zero trust
  • Discovering the basic features of Okta
  • Universal Directory
  • Single sign-on
  • Multifactor authentication and adaptive multifactor authentication
  • Lifecycle management
  • Advanced features of Okta
  • Okta Advanced Server Access
  • Workflows
  • Okta Access Gateway
  • API Access Gateway
  • Okta and NIST
  • Summary
  • Chapter 2: Working with Universal Directory
  • Directory integrations
  • Microsoft AD integration
  • LDAP integration
  • Everything about users
  • Using groups
  • Types of groups in Okta
  • Using AD groups
  • Creating users in AD through Okta groups
  • Pushing groups
  • Deleting groups
  • Assigning applications to groups
  • Some best practices for group usage
  • Overview of devices
  • Registering a device
  • Summary
  • Chapter 3: Using Single Sign-On for a Great End User Experience
  • Using single sign-on with Okta
  • Understanding global session policies
  • Using the Okta dashboard
  • Setting up Agentless Desktop single sign-on
  • Simplifying administration with the Okta Integration Network
  • Setting up a basic integration with Secure Web Authentication
  • SWA with the App Integration Wizard
  • Using SAML and OpenID Connect applications
  • Managing inbound SSO
  • IdP discovery
  • Summary
  • Chapter 4: Increasing Security with Adaptive Multifactor Authentication
  • Factor types
  • Knowledge factors
  • Possession factors
  • Biometric factors
  • Authenticators and enrollment
  • Knowledge factors
  • Possession factors
  • Biometric factors
  • MFA enrollment
  • Contextual access management
  • Device security signals
  • Integrating with MDM.
  • Setting up network zones
  • Behavior detection
  • Enrolling end users in MFA
  • Resetting authenticators
  • Securing a VPN with MFA
  • Summary
  • Chapter 5: Automating Using Lifecycle Management
  • Automating user provisioning
  • Provisioning users
  • Sourcing users
  • Provisioning rich profiles
  • Keeping track of attributes with attribute mapping
  • Attribute magic with Okta Expression Language
  • Setting up group rules
  • Setting up self-service options
  • Summary
  • Chapter 6: Customizing Your Okta GUI
  • Understanding the basics of end user functionality
  • Customizations and the branding of your Okta
  • The Okta plugin settings
  • Summary
  • Part 2: Extending Okta
  • Chapter 7: Okta Workflows
  • What Okta Workflows is
  • Using workflow capabilities
  • Using Okta Workflows
  • Your first Workflows contact
  • Okta Workflows flows
  • Platform features
  • App integrations
  • The Workflows Connector builder
  • Templates
  • Exporting workflows
  • Delegated admin workflows
  • Summary
  • Chapter 8: API Access Management
  • API terminology
  • Managing Okta with APIs
  • Using Okta's APIs
  • Rate limits
  • Fundamentals of API Access Management
  • Level 1 - no security
  • Level 2 - using API keys
  • Level 3 - OAuth 2.0
  • Level 4 - API gateways
  • Level 5 - API gateways and API Access Management
  • API access administration
  • Authorization server
  • Key rotation
  • Summary
  • Chapter 9: Managing Access with Advanced Server Access
  • ASA - a high-level overview
  • How ASA works
  • Setting up ASA
  • Configuring ASA
  • Enrolling a server
  • ASA client
  • Setting up gateways
  • Session capturing
  • AD-joined advanced capabilities
  • Managing your ASA environment
  • Managing projects
  • Automation
  • Summary
  • Index
  • Other Books You May Enjoy.