home.social

#okta — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #okta, aggregated by home.social.

  1. SCIM (System for Cross-domain Identity Management: RFCs 7643 & 7644) is the standard way for an identity provider like #Okta or Azure AD to push users and groups into your application: who joined, who got deactivated, who got added to which group.

  2. #UNC6783 extortionist hackers impersonate support staff, using fake Okta login pages and social engineering to access corporate systems and steal sensitive data, #Google warns.

    Read: hackread.com/unc6783-hackers-f

    #CyberSecurity #CyberCrime #Okta #Extortion #Scam

  3. I found a stock that has a worse P/E ratio than #Tesla or #Palantir

    I didn’t think it was possible, but #Okta has a P/E of 59,333.

    How has it not gone bust?!

  4. @[email protected]

    On the plus side, step #1 of setting up things like an
    #AWS/#Azure/#GCP account — especially production ones — is to disable the ability to create IAM users (forcing the use of IAM-roles that are 2FA authenticated via a service like #Okta) …and the role-based authentication-tokens are typically TTLed to a couple hours.

    Still, a "good" (suspicious-quotes) agent-setup would be pretty trivial to configure to snarf credentials from the relevant token-services. That triviality likely applies more broadly.

  5. "To start your certification process, please first install this random software on your corporate computer." -- Okta

    Yeaaaah, I'm sure InfoSec is going to LOVE that.

    #Okta #InfoSec

  6. Part of my #Monday work ritual is giving the ol' work laptop a refresh, which means shutting it down completely and powering it back on. But then it runs like slow ass, so I have to give it a reboot and then it's fine. Then once I log in with #Okta 853 times to get #Zscaler authenticated I'm off and running!

    Gotta love #SSO.

  7. Okta, for an authentication system, has so many rough edges and bad user experiences.

    In the portal, and click the Sign Out button? Yeah, doesn't do anything.

    Already logged in, but touching something that requires 2FA? Tell the user that, and give them options on what 2FA to trigger.

    My org doesn't allow Windows Hello, so if I login with that, having Okta Verify pop up, with a big "Windows Hello confirmation <disabled>" doesn't help me, I can't use that to 2FA.

    #okta #badux

  8. Who of you fine folks will be visiting Oktane on the Road in Hannover this Wednesday?

    #Okta #Oktane #OktaneOnTheRoad #Hannover

  9. 👨‍💻🔐 Oh look, another enthralling tale of #AI slop from the tech wizards at #Okta, where #OAuth #vulnerabilities are as common as JavaScript frameworks. Apparently, injecting parameters into their #nextjs0auth project was so simple, even a chatbot could have written the patch. 🚀✨
    joshua.hu/ai-slop-okta-nextjs- #TechNews #HackerNews #ngated

  10. Auth0’s developer trust is fading fast.

    Support delays, unpredictable costs, and forced migrations have made 2025 tough for SaaS teams relying on it.

    🔧 SSOJet gives you a simpler path — add enterprise SSO on top of Auth0 (or any IDP), keep your stack, and pay flat-rate pricing.

    Devs deserve reliability, not chaos.

    🔗 Read the full blog: Auth0 Support After Okta: What Developers Are Saying in 2025

    ssojet.com/blog/auth0-support-

    #SSO #Auth0 #Okta #Developers #B2BSaaS #IAM #SCIM #SAML

  11. Purple Teaming Okta Detection Virtual Workshop happening this Wednesday!

    Join other security engineers and SOC analysts for practical Okta detection engineering on September 3rd.

    You'll get live demonstrations of Okta log ingestion, hands-on experience building custom detection rules for identity threats, and the chance to test your detections with adversary emulation tools in individual lab environments.

    Stop relying on rigid vendor solutions and start building detection capabilities tailored to your environment.

    Register: limacharlie.wistia.com/live/ev

    #cybersecurity #okta #threatdetection

  12. Anyone else going to be at Oktane in September?

    #oktane #okta #iam

  13. Less than a week left to register for our Purple Team Okta Detection Workshop!

    Don't miss your chance to build real-world Okta detection capabilities using our SecOps Cloud Platform on September 3rd.

    In this hands-on workshop, you'll learn to detect suspicious logins, privilege escalation, MFA bypasses, and more using your own dedicated lab environment.

    Ready to take control of your identity security stack?

    Save your seat: limacharlie.wistia.com/live/ev

    #cybersecurity #okta #threatdetection

  14. Join us September 3rd for a virtual purple team workshop where you'll master Okta log integration and detection engineering on the LimaCharlie SecOps Cloud Platform.

    What you'll build:

    ✓ Seamless Okta log ingestion pipelines
    ✓ Custom detections for suspicious logins, privilege escalation and MFA bypasses
    ✓ Validated detection rules using open-source adversary emulation tools
    ✓ Real-world purple team scenarios in your own dedicated lab environment

    Ideal for security engineers, SOC analysts, and anyone serious about identity threat detection. You'll work hands-on in your own individual lab built with free and open-source tools in this live, unrecorded session.

    Break free from vendor lock-in and build custom detection capabilities you actually need.

    Register now: limacharlie.wistia.com/live/ev

    #cybersecurity #okta #threatdetection

  15. Okta just flipped the script on cybersecurity by open-sourcing its Auth0 Rules Catalog. Imagine a community-powered playbook that spots threats before they strike—ready to change the game? Check out how this could redefine defense.

    thedefendopsdiaries.com/oktas-

    #okta
    #cybersecurity
    #opensource
    #threatdetection
    #auth0

  16. etc:

    "we provide perfect endpoint security by committing only 10 of the worst sins"

  17. Couldn't log in to our #MagnetForensics account for some weeks. Password reset online not possible, it's advised to use the phone for it (wtf). Decided to try an e-mail and had success. After 15min we got a temp password and were back in.

    As we did not change our pw and simply were locked out and because of the strange pw reset procedure I asked if Magnet is affected by the #Okta breach. If pw's or hashes were compromised.

    No f*cking answer in 2 days. That stinks!

    #dfir #forensics

  18. 😅 In light of everything with #Okta and @1password, I'm interested again in good tools for sanitizing and analyzing #HAR files and open to recommendations. #cybersecurity

    🔏 1Password's Report: blog.1password.com/files/okta-
    ✍️ Okta's Note: sec.okta.com/harfiles

  19. 1Password detects “suspicious activity” in its internal Okta account - Enlarge (credit: 1Password)

    1Password, a password manager used... - arstechnica.com/?p=1978094 #unauthorizedaccess #1password #security #biz#okta