Get started with Identity Threat Protection with Okta AI

Early Access release

Use this page to understand how to begin configuring and using Identity Threat Protection with Okta AI.

Before you begin

  • Ensure that you’re signed in as a super admin.
  • Ensure that you've set up Okta Verify and users are enrolled in a supported version:
    • Android: Okta Verify 7.26 or later
    • iOS: Okta Verify 9.9 or later
    • macOS: Okta Verify 9.8 or later
    • Windows: Okta Verify 4.9.1 or later

Configuration

Complete these configuration tasks to start using Identity Threat Protection.

Task

Description

Configure Universal Logout for your apps. Automatically log users out of supported apps when Identity Threat Protection identifies a change in risk. See Configure Universal Logout for third-party apps.
Configure delegated flows. Set up automated Workflows in response to threat detections. See Workflows for Identity Threat Protection with Okta AI.
Create an entity risk policy. Define a policy for your org and set up rules. See Entity risk policy.
Enable Continuous Access evaluation. Add continuous access evaluation to your authentication policies. See Continuous Access evaluation.
Configure Shared Signals Framework receivers. Use external risk signals to strengthen your org’s identity protection. See Configure a shared signal receiver.

Related topics

Identity Threat Protection with Okta AI dashboard widgets

Identity Threat Protection with Okta AI reports

System Log events for Identity Threat Protection with Okta AI