Okta’s Platform to Outsource Identity Management for Busy Developers – InApps is an article under the topic Software Development Many of you are most interested in today !! Today, let’s InApps.net learn Okta’s Platform to Outsource Identity Management for Busy Developers – InApps in today’s post !

Read more about Okta’s Platform to Outsource Identity Management for Busy Developers – InApps at Wikipedia

You can find content about Okta’s Platform to Outsource Identity Management for Busy Developers – InApps from the Wikipedia website

Although it has tended to be treated as something of an afterthought, the last year of remote work has made it clear that identity — from user accounts to privileged admin accounts and machine identities like credentials, certificates and secrets — is a key pillar of infrastructure and DevOps.

“Identity has become a true primary cloud — just as important as your other primary clouds like your infrastructure or your collaboration clouds. It’s also the secure epicenter of your organization’s technology connections,” said Okta CEO Todd McKinnon in his keynote for Oktane21, Okta‘s recent annual user conference, held virtually.

While identity is too important to be neglected, developers are a critical and scarce resource and are often already juggling DevOps responsibilities as well as handling development at all layers of the stack. They need to deal with user identities, identity for resources and the infrastructure they run on, for deployment and securing APIs.

“There just aren’t enough developers and those developers are sometimes wearing multiple hats,” John Pritchard, Okta developer relations vice president, told us, noting that usually, the tools for managing identity in each context are different, and not well integrated with standard developer tools.

The Okta low code Workflow interface.

Multiple Tools, Same Platform

At this year’s conference, Okta launched a new Developer Starter Edition to make it easier for developers to start using Okta’s identity platform. The company also unveiled a redesigned console, new docs and sample apps to help developers get up-and-running fast, and new integrations with DevOps and API security tools.

Okta also unveiled a new workflow tool plus identity governance, as well as risk analysis and privilege management services that extend the range of what developers can do without needing to become experts in identity.

Workflows for Customer Identity is a low-code visual interface that will be useful to citizen developers building customer-facing applications (whether that’s B2C or B2B), giving them access to the same Okta Integration Network that developers use for pre-configured integrations with DevOps, SecOps and API security tools. Someone in the marketing team can use a drag and drop visual tool to create a workflow using Hubspot, Salesforce, Marketo and SendGrid, while the developer creating a Heroku app can use the Okta platform to add identity directly from the Heroku CLI, and they both get the benefit of the policies and protections the organization has set up.

The authentication flow for an app can trigger backend integrations based on customer behavior — like pulling in personalized offers from a marketing system or customizing the login experience based on the type of account people are logging in with. Or it can call the new Risk Ecosystem API, which uses behavioral and transactional signals from third-party web application firewalls for fraud and bot detection tools like Fastly, HUMAN, F5 Networks, and PerimeterX.

Read More:   Node.js, JVM and the Surprising Results About Docker Swarm – InApps 2022

Although this is an API that fits well into cloud native event-driven architectures, Pritchard suggests that the SecOps team will be the experts in interpreting the signals. “Developers will look to the SecOps professional to say ‘what does this behavior indicate, what are the scenarios I need to account for’ and then that can be done programmatically,” Pritchard said.

A Marriage of Identity and Privilege Management

Identity governance is traditionally part of compliance and risk discussions. It’s something you don’t think about until there’s an audit or an e-discovery request, but it’s fundamentally the same question of who should have access to what resources and when. And although it’s usually treated completely separately from managing admin access, it actually goes hand in hand with privilege management. While Okta offers new services for each of them, Pritchard expects them to be increasingly adopted together.

Covering hybrid and multicloud infrastructure resources in a single control plane, Okta Privileged Access is a timely offering. Keyfactor’s recent “State of Machine Identity Management Report” suggests that organizations are struggling with policy governance and best practices for managing the keys, certificates and secrets that secure connections to servers, cloud workloads and IoT devices. Eighty-eight percent reported at least one outage caused expired certificates in the last two years, over half don’t have an accurate inventory of SSH credentials and a worrying number store code-signing keys on build servers and developer systems.

Privileged Access simplifies self-service, time-limited access to ephemeral cloud resources so DevOps or SRE teams can update and monitor systems without the risk of permanent access (or some admin having to take the time to remove admin access privileges manually after every incident). That could be jumping on Slack to ask for access to a database server so you can restart SQL and turn on logging to check that the problem is fixed or handling privileged infrastructure credentials in Kubernetes clusters.

Zoom’s explosive growth over the past year, going from 10 million users per day to over 300 million when life and work suddenly shifted online, is a prime use case for Okta’s Privileged Access. When much of the world went into lockdown in the spring of 2020, Zoom took a platform that was running almost exclusively in its own data centers to the public cloud. At the same time, their visibility and growth made them a target for hackers.

“We had a lot of controls around our authentication infrastructure for the backend. But when we grew at such a quick pace, we outgrew the tools we were using previously,” Zak Peirce, head of data center operations at Zoom, said during a presentation at Oktane21. They had to rethink their server IAM and automation tooling and turned to Okta, which allowed Zoom to scale its team and remain secure, he said.

“I just want my team to be able to install a client… configure it on their laptop and they are able to SSH to the servers with almost no changes,” Peirce said. “Whereas previously they would have had their public/private key pair that was issued by an administrator. Now they just have their credentials with Okta that are provided to them at onboarding. The workflow change was one browser window and that’s it… so very limited changes for the administrators in order to do their work.”

The policy for how resources are managed will have been defined by the security team and they grant just-in-time, time-bound access to make those specific changes.

Read More:   How to Avoid Burnout Managing an Open Source Project – InApps Technology 2022

Identity governance integrates many of the previously point-to-point integrations between identity proofing providers and marketing technology systems, which opens the policy decisions around things like customer acquisition up to more people who have different priorities.

The marketing team cares most about making customer signup fast and frictionless; the security team wants to make sure specific steps in the process are being verified. While agreeing on the right balance for the identity governance policy, they can address more sophisticated questions like different data regulations or extra personalization that can make the signup process more engaging. “They could jointly model where you’ve got GDPR requirements or citizenship requirements,” Pritchard suggested.

But it also leverages the same patterns as handling identity in other areas, Pritchard noted.

Like the risk analysis, doing governance through services in an identity platform that developers consume can be part of a “shift left” approach, one which avoids the delays common with a final security review.

“This makes it more efficient because you engage security professionals much sooner and they get to do what they do best, which is think about managing risk and enforcing policy, and then allow it to be expressed programmatically with all the resources that the DevOps team are looking to make changes against — without making it a ticketing system or all the things that we have to suffer through where automation is just one part of what you have to do so you send a request in and wait,” Pritchard said.

The Risk Ecosystem API pulls in third-party signals from your security stack.

Putting the I in CI/CD

Okta unveiled some specific integrations for cloud native infrastructure, to fit the “as-code” automation pattern where policy is authored in an identity provider like Okta and expressed in an API gateway like Kong. The infrastructure can be securely deployed through CI/CD pipelines with tools like Terraform, to make it easier to manage identity across different environments like QA, staging, production, especially “in a zero-trust environment where service to service and container to container is inherently untrusted.”

Rather than operators having to populate, sync and configure user identities in all those environments, it should be automated as part of the CI/CD pipeline like the rest of the stack, offering repeatability and taking the human out of the loop. But it also leverages the same patterns and policies as handling identity in other areas, whether that’s an identity gateway at the edge, an ingress controller or a service mesh, Pritchard noted.

“If we do this right, we have these different enforcement points where that policy can be enacted; that could be a gateway at the edge or a controller inside of a pod,” he said. “There’s all these different echelons where the security identity stuff is happening and there’s different technology that enforces it but if we can get consistent about how we express it, and the tooling that allows the people that make those policies to find that in one place, then, then we’ve got it right.”

Deploy identity with Terraform like the other app dependencies.

TNS Editorial and Marketing Director Libby Clark contributed to this post.  

InApps is a wholly owned subsidiary of Insight Partners, an investor in the following companies mentioned in this article: Keyfactor.

Images courtesy of Okta.

Source: InApps.net

List of Keywords users find our article on Google:

identity governance
privilege manager
marketo templates
“looking for” “developer” “outsource”
identity manager
marketo sales insight
hire heroku developers
marketo best practices
slack ediscovery
automation identity experience framework
hubspot consultant jobs
privileged identity manager
marketo responsive email templates
okta developer
marketo linkedin
clark outsourcing
marketo consultant needed
okta jobs
contact clark outsourcing
busy software
okta privileged account management
visual workflow salesforce
outsourced b2c order fulfillment solution
salesforce developer console
whatsapp hubspot integration
marketo linkedin integration
gdpr marketo
“managed outsource solutions”
okta twitter
salesforce b2b commerce cloud si
marketo administrator jobs
outsource customer service clark
hubspot trustpilot integration
okta terraform provider
marketo engage pricing
fastly investor relations
hire marketo developers
identity management consultant jobs
marketo docs
ca privileged identity manager
salesforce marketo sync
okta api
hubspot outage
okta investor relations
mobile device management wikipedia
identity automation jobs
busy to whatsapp api
marketo event app
marketo website personalization
what is okta mobile
sendgrid vs marketo
web personalization marketo
hire hubspot api developers
okta automation
heroku salesforce
okta
sendgrid salesforce integration
ingress controller vs api gateway
okta software
privilege management software
marketo ui
microsoft identity manager
marketo consultant
okta stock
“okta” “identity governance”
identity wikipedia
“okta”
identity platform for developers
outsource customer support for edtech companies
linkedin okta login
saas pillar pod
saas recruitment process outsourcing
“marketo us” “digital marketing” or “social media marketing” or b2b or
“modern marketing” or “marketing software”
privileged access manager ui
the retail outsource jobs
okta spring
edtech customer support outsourcing
hire remote marketo developers
f5 engineering team
okta case studies
world okta
marketo consultant jobs
triggered send salesforce marketing cloud
marketo recruitment
sendgrid sub accounts
outsource contact center clark
okta api gateway
heroku salesforce integration
f5 investor relations
sendgrid year in review
chi okta
salesforce cli
f5 cloud edition
outsource el segundo
f5 deploy api gateways
okta microsoft teams
okta conference
okta workflow automation
onboarding in pillar page
what is the use of heroku in salesforce
hubspot investor relations
okta t mobile
ssh privileged access
f5 networks investor relations
microsoft identity manager jobs
salesforce marketing cloud vs marketo engage
okta workflows
outsourcing company clark
ca privileged access manager
salesforce sendgrid integration services
zoom developer
heroku app facebook
api gateway ingress controller
f5 automation
microsoft identity governance
privileged access management engineer jobs
salesforce app cloud identity reviews
identity management software reviews
ediscovery jobs remote
identity & access management jobs
“marketo”
linkedin marketing developer platform
okta zoom
salesforce portfolio success manager
self-service ediscovery software
slack technologies investor relations
heroku telegram bot
marketo web personalization
outsource asia
self service ediscovery software
www okta com
ca privileged access management
ediscovery remote jobs
f5 policy enforcement management
netlify identity
f5 identity management
heroku app store
how to integrate x with marketo
hubspot full stack developer
identity governance and administration software ranking
sendgrid salesforce
www okta
busy me tool box
f5 devops
marketo workflow
sendgrid transactional email reviews
marketo change email template
présentation marketo
cloud identity software reviews
f5 application delivery automation
marketo apps
marketo development
salesforce b2b commerce install
sfdc heroku
identity governance products
marketo mobile app
security privileged identity manager
sql server audit trigger
f5 engineer
heroku cli
identity governance and administration software selection
b2c customer identity management
ca identity management
express container management
f5 bot protection
ingress controller versus api gateway
linkedin marketo integration
okta startup
okta valuation
privileged account manager
what does okta do?
f5 devops pipeline
identity platform
standard platform user profile salesforce
what is okta?
whatsapp integration with hubspot
cloud identity platform
email performance report marketo
f5 bot manager
marketo app
marketo case studies
marketo personalization
self-service ediscovery
the retail outsource
consulting for technology verifiable digital credentials
f5 deploy automation
how much do salesforce developers make
hubspot whatsapp integration
identity workflow
marketo gdpr
outsource whatsapp customer service
sendgrid email api reviews
Rate this post
As a Senior Tech Enthusiast, I bring a decade of experience to the realm of tech writing, blending deep industry knowledge with a passion for storytelling. With expertise in software development to emerging tech trends like AI and IoT—my articles not only inform but also inspire. My journey in tech writing has been marked by a commitment to accuracy, clarity, and engaging storytelling, making me a trusted voice in the tech community.

Let’s create the next big thing together!

Coming together is a beginning. Keeping together is progress. Working together is success.

Let’s talk

Get a custom Proposal

Please fill in your information and your need to get a suitable solution.

    You need to enter your email to download

      Success. Downloading...