Okta Identity Engine allows organizations to customize their Okta cloud components and satisfy an unlimited number of identity use cases. Instead of relying on predefined behavior for identification, authorization, and enrollment, Identity Engine offers customizable building blocks that can support dynamic, app-based user journeys.
To access the docs from the Admin Console, click the help link on any page or the help icon next to your username. If you’re not sure which solution you’re using, check the footer on any page of the Admin Console. The version number is appended with E for Identity Engine orgs and C for Classic Engine orgs.
Follow this sequence of configuration tasks to start using Identity Engine.
|User management||Every user has a unique profile within Okta. You can manage users in groups or individually.|
|CSV directory integration||Integrate directories like Active Directory (AD) or Lightweight Directory Access Protocol (LDAP).|
|Administrators||Assign admins to maintain all aspects of the end-user experience in your orgs.|
|Get started with app integrations||Configure apps for your org. SSO setup docs for many apps are available from the Admin Console.|
|Okta Browser Plugin||Configure the Okta Browser Plugin so your users can automatically sign in to applications.|
|Integration guides||Configure the parameters of your app integrations, and then assign them to groups or individual users in your org.|
|Sign-on policies and rules||Set a global session policy and authentication policies. Identity Engine requires that the assurance in these policies is satisfied before the end user accesses an app.|
|Multifactor authentication||Enable the authenticators that your users must provide for verification by an application or service.|
|Risk scoring||Risk Scoring uses a risk engine that determines the likelihood of an anomalous sign-in event.|
|Network Zones||Network Zones define security perimeters around in which you can restrict or limit user access to your org.|
|ThreatInsight||ThreatInsight aggregates data across the Okta customer base and uses this data to detect malicious IP addresses that attempt credential-based attacks.|
|Devices and Okta FastPass||Deploy Okta Verify to devices, integrate Okta Verify with your EDR solution, manage the device lifecycle state, and configure Okta FastPass.|
|Monitoring and reports||Learn how Okta reports and System Log queries help you detect potential security risks and understand how users consume your apps and service.|