Under active development Content is continuously updated and improved

Okta

by Okta, Inc.

Enterprise identity and access management platform

Official Docs

Under Construction: This guidance is being actively developed and verified. Content may change.

Authoritative Sources

Key guidance documents from authoritative organizations. Click to view the original source.

NIST SP 800-63B §4.2: "AAL2 provides high confidence that the claimant controls authenticator(s) bound to the subscriber's account. Proof of possession and control of two distinct authentication factors is required through secure authentication protocol(s). Approved cryptographic techniques are required at AAL2 and above." §4.3: "AAL3 provides very high confidence that the claimant controls authenticator(s). AAL3 authentication SHALL use a hardware-based authenticator and an authenticator that provides verifier impersonation resistance." §5.2.5: "Verifier impersonation resistance... requires that the communication channel between the claimant and the verifier be authenticated." Okta supports AAL2+ with MFA and AAL3 with FIDO2/WebAuthn security keys.

Configuration Examples(3)

·

Security configuration baseline for Okta tenants. Covers MFA policies, session management, admin access controls, and API token security.

Configuration Examples(1)

·

Official hardening guide covering admin security, MFA enforcement, API token management, audit logging, and network zones.

Configuration Examples(6)

·

SOC 2 CC6.1: "The entity implements logical access security software, infrastructure, and architectures over protected information assets." CC6.2: "Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users." CC6.3: "The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles." NIST CSF PR.AC-1 maps to CC6.1/CC6.2 - Okta implements identity lifecycle management aligned with SOC 2 TSC requirements.

ISO 27001:2022 A.5.15: "Rules to control physical and logical access to information shall be established and implemented." A.5.16: "Identities shall be managed through its lifecycle." A.5.17: "Authentication information shall be controlled through a management process." A.5.18: "Access rights shall be defined and implemented according to business and security requirements." Okta supports ISO 27001 access control requirements through centralized identity governance.

Open Source Tools

Community and open-source tools for Okta.

Verification Commands

Commands and queries for testing and verifying security configurations.

List all active users API
GET /api/v1/users?filter=status eq "ACTIVE"&limit=200
Check MFA enrollment for user API
GET /api/v1/users/{userId}/factors
List super admin role assignments API
GET /api/v1/users?filter=status eq "ACTIVE"
Query authentication events (last 24h) API
GET /api/v1/logs?since={ISO8601}&filter=eventType eq "user.authentication.sso"
List all integrated applications API
GET /api/v1/apps?limit=200
Get ThreatInsight configuration API
GET /api/v1/threats/configuration
List sign-on policies API
GET /api/v1/policies?type=OKTA_SIGN_ON
Get policy rules API
GET /api/v1/policies/{policyId}/rules
List API tokens API
GET /api/v1/api-tokens

Related Controls

Security controls from various frameworks that relate to Okta.

Related Technologies