info@aikyam.in +91 9441311695
Banner Image

IAM

Identity Access Management

OKTA Course Content Employees

Explore the comprehensive course content designed to help you master OKTA.

  1. 1. Overview of Single Sign-On
  2. 2. Single Sign On Protocols (SAML, OIDC, SWA)
  3. 3. User Management
  4. 4. Directory Integrations
  5. 5. Application Integrations
  6. 6. User and application lifecycle management
  7. 7. Multifactor
  8. 8. Various policies in Okta
  9. 9. Customization of Okta tenant
  10. 10. API and its use cases in Okta
  11. 11. External Identity Provider
  12. 12. Hands-on Projects
  13. 13. Bonus: Workflows
  1. 1. Overview of Okta APIs
  2. 2. Understanding Okta Authentication Models
  3. 3. NodeJS Primer
  4. 4. Sign In Widget
  5. 5. Okta Hooks
  6. 6. Overview of Okta Workflow
  7. 7. Advanced Workflow concepts
  8. 8. Multifactor
  9. 9. Various policies in Okta
  10. 10. Customization of Okta tenant
  11. 11. OIDC integration
  12. 12. External Identity Provider
  13. 13. Authorization Servers
  14. 14. Bonus: Custom app to make use of Okta API
  1. 1. Solid fundamental knowledge on core concepts
  2. 2. Exposure to current industry use-cases
  3. 3. Practical approach for real-time projects
  4. 4. Best practices in OKTA training
  1. Project 1: SSO application Integration
  2. Project 2: Automated User Onboarding with APIs

Description


Identity and Access Management (IAM) Overview

Learn the key issues and concepts for adding identity and access management to your internal and external services.

Designing and implementing sign-in flows and access management ensures that the right person has access to the right services. Identity and Access Management (IAM) impacts your end users, customers, and employees and makes it easier to adapt to changing security needs. Even small issues with the design or implementation of IAM can cause reliability issues, or worse, expose a weakness in your security.

A key concept for using IAM is understanding who needs to access which services and their objectives. It's not always as simple as employees and customers as there may be different types of access, such as a user or an administrator. Designing and implementing IAM systems to meet your requirements can also require significant effort. Okta can reduce the time, effort, and risk.

What to Know About IAM

Some topics require more information:

IAM Concepts

IAM secures your services in two ways. First, it verifies the identity of a user when they sign in. Second, it lets a user access only the parts of your network and services that they have permission for.

For example, a customer may require only a username and password and has permission to view and buy items. While a vendor may require a one-time passcode and has permission to add and update items, but not buy them.

Features of an IAM Solution

You can divide the features of an IAM system into three areas: user experience, security, and infrastructure. The following sections illustrate the most important features in each area:

Infrastructure

  • Scalability
  • Easy integration with app stack
  • Traffic surge protection
  • High availability
  • High reliability

Security

  • User storage and password management
  • Multifactor Authentication (MFA)
  • Distributed Denial of Service (DDoS) protection
  • Compliance
  • Data access control

User Experience

  • Self-service
  • Social authentication
  • External Identity Provider (IdP)
  • Single Sign-On (SSO)
  • Automated onboarding
  • Frictionless MFA experience