Tag: Risk
-
The Okta ITP Workflows Connector
In May 2025 Okta released a Workflows connector for Identity Threat Protection with Okta AI, called the Okta ITP connector. This article is a brief walkthrough of the connector. Introduction With the release of Identity Threat Protection with Okta AI (ITP), new capabilities have been added to the Okta Workforce Identity platform for risk evaluation/detection…
-
Using Risk in Okta to Manage Privileged Access in OPA
Identity Threat Protection with Okta AI will continuously assess user context and automatically respond to identity threats across your ecosystem. This includes managing entity (user) risk levels. Okta Privileged Access does not explicitly have user risk built in, but user risk can be applied to control how users access privileged resources. This article looks at…
-
Okta Privileged Access – Determining and Highlighting Risk in Roles and Policies
Okta Privileged Access provides a flexible framework for controlling who can access what privileged resources and how. This includes resource groups for managing resources, security policies for controlling access, administrative roles to manage them, and principals to use them. Invariably configuring the PAM solution will introduce risk. But how to monitor and manage the risk…
-
Risk-based Access Approval with IBMs IGA Products
Identity Governance and Administration (IGA) solutions are all about reducing the risk to businesses that users and their access represent. But they also need to maintain an ease-of-use so that users don’t find ways to circumvent IGA controls and introduce more risk. With IGA tools, like IBM Security Identity Governance and Intelligence (IGI) and IBM Security Identity Manager…
