Okta is the Identity Standard, securing all your critical resources from cloud to ground. Learn how Identity and Access Management (IAM) addresses modern security threats and reduces IT friction. Identity and access management (IAM) tools connect users to the systems and tools they rely on, easing experience for users, menial tasks for IT, and security for both. As the leading provider of identity for the enterprise, Okta has much to say about IAM.
Introduction to IAM
♦ Web SSO Providers in the market.
♦ Single sign-on providers also available.
♦ Introduction to OKTA.
OKTA Configuration & Setup
♦ Monitoring
♦ Management
♦ Disaster recovery
♦ Security Compliance
♦ Networking, storage, etc.
OKTA vs OTHER IAM TOOLS
♦ Compare OKTA with Active directory Federation Server
♦ The architecture of OKTA.
♦ OKTA architecture’s Outline.
♦ Pricing and Features
Using SAML 2.0 IDP
♦ SAML 2.0 configuration with OKTA.
♦ Hosting application in OKTA
♦ Assigning users and permissions to hosted applications by OKTA
Integrate OKTA IAM with On-Premise Applications
♦ API as-a-master
♦ SCIM
♦ On-premises provisioning (OPP) to solve custom user lifecycle management scenarios
ADMIN Roles & Responsibilities
♦ Components in OKTA
♦ Partner IDP, Vendor settings, certificates, and Handshake concepts.
BEST PRACTICES IN OKTA IAM IMPLEMENTATION
♦ Standards
♦ Monitoring
♦ Patch management
♦ Developing automation tools
We can assure a 100% job guarantee and Placement. Contact us for Free - Demo.
Copyright © 2017 - Developed by Infihive Consulting Services LLC changes