Start using Identity Engine
Follow this sequence of configuration tasks to start using Identity Engine.
Task | Description |
---|---|
User management | Every user has a unique profile within Okta. You can manage users in groups or individually. |
CSV directory integration | Integrate directories like Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). |
Administrators | Assign admins to maintain all aspects of the end-user experience in your orgs. |
Get started with app integrations | Configure apps for your org. SSO setup docs for many apps are available from the Admin Console. |
Okta Browser Plugin | Configure the Okta Browser Plugin so your users can automatically sign in to applications. |
Integration guides | Configure the parameters of your app integrations, and then assign them to groups or individual users in your org. |
Sign-on policies and rules | Set a global session policy and authentication policies. Identity Engine requires that the assurance in these policies is satisfied before the end user accesses an app. |
Multifactor Authentication | Enable the authenticators that your users must provide for verification by an application or service. |
Risk scoring | Risk Scoring uses a risk engine that determines the likelihood of an anomalous sign-in event. |
Network Zones | Network Zones define security perimeters around in which you can restrict or limit user access to your org. |
ThreatInsight | ThreatInsight aggregates data across the Okta customer base and uses this data to detect malicious IP addresses that attempt credential-based attacks. |
Devices and Okta FastPass | Deploy Okta Verify to devices, integrate Okta Verify with your EDR solution, manage the device lifecycle state, and configure Okta FastPass. |
Monitoring and reports | Learn how Okta reports and System Log queries help you detect potential security risks and understand how your apps and services are consumed by end users. |