SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Okta Administration: Up and Running

Lovisa Stenbäcken Stjernlöf, HenkJan de Vries

2 min read
in Book, Learning

 

Book Description

IAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you’ll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers.

Once you’ve understood how Okta can be used as an IAM platform, you’ll learn about the Universal Directory, which covers how to integrate other directories and applications and set up groups and policies. As you make progress, the book explores Okta’s single sign-on (SSO) feature and multifactor authentication (MFA) solutions. Finally, you will delve into API access management and discover how you can leverage Advanced Server Access for your cloud servers and Okta Access Gateway for your on-premises applications.

By the end of this Okta book, you’ll have learned how to implement Okta to enhance your organization’s security and be able to use this book as a reference guide for the Okta certification exam.

What you will learn

  • Understand different types of users in Okta and how to place them in groups
  • Set up SSO and MFA rules to secure your IT environment
  • Get to grips with the basics of end-user functionality and customization
  • Find out how provisioning and synchronization with applications work
  • Explore API management, Access Gateway, and Advanced Server Access
  • Become well-versed in the terminology used by IAM professionals

Get Book

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: BooksHenkJan de VriesLovisa Stenbäcken StjernlöfMFA BooksOkta Administration: Up and Running
7
VIEWS
ADVERTISEMENT

Related Posts

Certified Secure Software Lifecycle Professional (CSSLP)

Certified Secure Software Lifecycle Professional (CSSLP)

June 27, 2022
Software Security Practitioner – Quality Assurance

Software Security Practitioner – Quality Assurance

June 27, 2022
Certified Software Quality Manager (CSQM)

Certified Software Quality Manager (CSQM)

June 27, 2022
Certified Software Quality Analyst (CSQA)

Certified Software Quality Analyst (CSQA)

June 27, 2022

More Articles

The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things

February 17, 2021
Alerts

CISA Releases Guidance: IPv6 Considerations for TIC 3.0

September 23, 2021
Cyber101

GLBA Financial Privacy Rule

June 7, 2022
Tool

AWS CloudHSM

April 15, 2022
Incidents

North Korea-linked Zinc group posed as Samsung recruiters to target security firms

November 28, 2021
Quotes

“The insider threat is much broader…”

April 13, 2022
Quotes

“Hacktivism is a digital disobedience. It’s hacking for a cause”

January 19, 2022
Movie

Terminator 2: Judgment Day (1991)

September 25, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....