Listing Thumbnail

    Okta Identity Platform [Private Offer Only]

     Info
    Deployed on AWS
    With the Okta Identity Cloud organizations can securely connect their workforces, partners and customers to the right technology at the right time.
    4.3

    Overview

    Play video

    Okta is the modern access solution for all resources from cloud to ground that enables organizations to quickly deploy modern experiences across their entire business. Okta Workforce Identity ensures employees have quick and secure access to the tools they need to get work done.

    • Single Sign-On: Deploy SSO across applications, including AWS SSO.
    • Universal Directory: Consolidate users, groups and devices from a number of sources into a single directory.
    • Lifecycle Management: Automate management of the employee lifecycle, including provisioning of users and groups into AWS SSO.
    • Adaptive Multi-Factor Authentication: Deploy a set of second factors and contextual access policies based on risk. Customer Identity and Access Management delivers secure, seamless customer experiences and expedite time to value. Okta's Customer Identity offering includes:
    • Authentication: Embed secure login and SSO with flexible authentication options including; OIDC and social authentication. Enhance security with step-up authentication using a broad set of second factors.
    • Authorization: Control which apps and APIs users have access to using attribute-based policies enforced through SAML and OAuth protocols.
    • User Management: Add registration to your apps and manage customer identities at scale via APIs or from Okta's user friendly admin console. For Custom Configurations, Volume Pricing or CIAM available via Private Offer please contact us at: okta@carahsoft.com 

    Highlights

    • Single Identity Platform: Power business velocity with a single place to create, maintain, and audit authentication and authorization policies for every layer of an application across cloud, on-premise, or hybrid environments.
    • Robust Ecosystem: Extend Okta to create engaging digital experiences, expedite large scale technology deployments and enhance security with over 6500 pre-built integrations.
    • Comprehensive AWS Integrations: Centralize and secure access to AWS and manage entitlements across all AWS accounts for end users, developers and the applications they build with pre-built integrations and customizable workflows.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Okta Identity Platform [Private Offer Only]

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Okta Workforce Identity
    150 internal users workforce identity products suite
    $0.20
    Okta Customer Identity
    20,000 external users customer identity products suite
    $0.10

    Vendor refund policy

    All orders are non-cancellable and all fees and other amounts that you pay are non-refundable. If you have purchased a multi-year subscription, you agree to pay the annual fees due for each year of the multi-year subscription term.

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Support

    Vendor support

    Through our expert teams and robust digital resources, we ensure you can always access urgent and proactive support, whenever and however you need it, anywhere in the world. Access the Okta Community to get help, engage with us and your peers, submit product requests, and access the key resources you need to drive success. We offer support and success packages that are based on your needs and align with the complexity of your deployment to give you the power of choice. support@okta.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.3
    57 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    60%
    39%
    2%
    0%
    0%
    16 AWS reviews
    |
    41 external reviews
    External reviews are from PeerSpot .
    Luis Sebastiao

    Unified identities have simplified secure access management and improved compliance

    Reviewed on May 14, 2026
    Review from a verified AWS customer

    What is our primary use case?

    I use Okta Platform  as an administrator to set up new SAML and SSO  apps. We also use the governance module as well. We also use the automation functions with workflows. We use it mainly as our main identity platform. I have been using it at all my past companies.

    What is most valuable?

    What I appreciate about Okta Platform  is that it is most of the time a very good no-code platform. It allows us to set up new SSO  integrations quite easily, even if the app doesn't really support SSO natively. It is pretty easy to configure on Okta Platform.

    Okta Platform has impacted my organization positively by providing convenience, first of all. There are no more different passwords for many different apps, since SSO doesn't really require password storing. Security has also improved because we eliminate a very big weak point that passwords represent. Additionally, we maintain control to ensure we only give access to the necessary apps to the necessary people.

    What needs improvement?

    I would definitely see improvements in the governance module of Okta Platform. The way we do certification of accesses, certification campaigns, and access requests could be improved. A better way for users to actually request an instance in Okta Platform, for example, an app, without having to use a third-party integration for ServiceNow  or Jira  Service Management, would be valuable. Having something built in to Okta Platform would be beneficial.

    From the features perspective, functionality-wise, I would see recent features included in Okta Platform. Our company works on a hub-and-spoke model, and Okta Platform did introduce a way to have more of a federated level. What they call claim sharing, and we really would appreciate a bit more improvement on that functionality, since that functionality helps us to have a single identity on a hub and pass that identity to the other spokes and have seamless login between all of them. Claim sharing helps with that, but the function is still not the best, especially related to authentication policies. There are still some issues, especially when we have some mismatch between the authentication policies on different spokes. I definitely would appreciate some more improvements. Additionally, I would appreciate a bit more improvements on the logging features of Okta Platform, which still are not the best.

    For how long have I used the solution?

    I have been working with Okta Platform for more than five years at this point.

    What do I think about the stability of the solution?

    Regarding the Okta Platform, it has been stable. We do have different cells in different countries since we work on a hub-spoke model. On our EMEA cell, it has been quite stable. We did have some problems before on our US cells in these past few months, but nothing too serious. Most of the time, issues happen after hours on the US market. On our EMEA side, there have been no issues in these past few months.

    What do I think about the scalability of the solution?

    I find Okta Platform scalable and have not hit any limitations or scalability issues with it. We do have a good contract with our vendor that allows us to set up new users at any time and they basically review the contract a year after if we need to have more users. We really don't have scalability issues.

    How are customer service and support?

    If I would evaluate customer service and technical support of Okta Platform from one to ten, I would say a very good nine. We do have a very good relationship with our customer support representative, customer support manager in this case, or CSM. We also have a dedicated Okta Platform tech that we go to with more high-level questions. The level one support with the normal ticketing system from Okta Platform works pretty well most of the time. I never faced any issues, and if we need to escalate it for more complex issues, we can go to our dedicated tech manager support or our customer success manager and they are pretty quick to respond.

    Which solution did I use previously and why did I switch?

    I have mainly used Okta Platform. I did use a bit of Ping Identity, but it was so long ago that I really don't remember a lot of the platform at this point.

    How was the initial setup?

    When it comes to the deployment process of the initial setup with Okta Platform, we definitely faced some complexities, especially related to the way users authenticate. Sometimes authentication policies are a bit buggy in the sense that sometimes they really don't detect the correct browser that the user is using or there are issues related to the location of the user. The part of security authentication sometimes really doesn't work as well as it could. We did experience some problems in that sense.

    What about the implementation team?

    The deployment of Okta Platform was implemented fully in-house.

    Which other solutions did I evaluate?

    We did look at other solutions as well, such as One Identity and Ping Identity, before choosing Okta Platform. We decided to go with Okta Platform since it was the more complete option on the market at the time, with all the necessary functions that we had, especially related to authentication policies. It also had a better catalog of pre-built apps as well, so it was a bit more simple. We also started looking a few years ago to maybe replace Okta Platform with Entra ID, because we also did have Azure  products, but we decided to keep Okta Platform because Okta Platform still has much more documentation and much more time in the market. Their solution is a bit better in that sense.

    What other advice do I have?

    My best piece of advice for others who are looking into implementing Okta Platform would be related to the knowledge base. I would make sure people read through the main knowledge base from Okta Platform, so the main steps of integrations. One of the good advantages of Okta Platform is that most applications and authentication are all the same, since it uses base protocols such as SAML or OIDC. If you are able to build one, the other ones are pretty easy to build. Go through the knowledge base that Okta Platform has, which is very rich for understanding if it is actually a good solution for your problems. If it is, Okta Platform would be a good solution to use.

    The AWS  services that are integrated or secured through Okta Platform mainly include AWS  Cloud directly for cloud computing purposes.

    Okta Platform does protect non-human identities in our environments, such as service accounts. We have the perspective that we can monitor the access, so who actually accesses the accounts and who is the manager of those accounts. We maintain password rotation and password policies for those types of accounts, which are different from a normal user account. Okta Platform helps us with that.

    Related to the financial market, Okta Platform helps our company address specific regulatory requirements because we need to be SOX compliant, since we are a public traded company. Okta Platform helped us with being SOX compliant.

    I have noticed measurable security and operational improvements in our cloud-based workloads since implementing Okta Platform. One of the main ones is access to AWS cloud environments. Thanks to Okta Platform, we can set up push groups to the AWS IAM  module. We can actually give access to specific AWS spaces to specific teams in this case. For example, if we have a cloud team that works on a specific region, we can give access to an Okta Platform group to that specific team, and they will have access to that AWS cloud space. We have a lot of that, and it helped us a lot.

    I would rate this review a nine overall.

    Dipendu Gupta

    Centralized access has streamlined secure authentication and accelerated cloud integrations

    Reviewed on May 03, 2026
    Review from a verified AWS customer

    What is our primary use case?

    The main use cases for Okta Platform  are authorization and authentication. From the SSO , I can understand if the person logging in is authorized to redirect to the correct URL. The second use case involves JWT token generation, which includes all the information about the user, such as SSO  Gmail and other information about the permissions that person has. When I get that JWT from the code, I can access more user information and authenticate for other services using 3LO.

    I haven't handled 2LO, which refers to service-to-service authentication. Okta Platform  provides protection for non-human identities in our environment through 2LO, enabling services to call databases or APIs without human involvement, which allows M2M access. For instance, if an MCP gateway needs to access tools without human interaction, Okta Platform offers this option.

    One example of how Okta Platform helps secure access to cloud infrastructure is through the AWS  service called Bedrock Agent Core, where I can directly integrate with Okta Platform. AWS  provides an option for this integration, allowing us to connect our API after authentication.

    What is most valuable?

    The best features of Okta Platform are fast authentication and smooth integration with AD groups. AD groups control the permissions people have in our enterprise through our in-house software called CIAM . This integration with Okta Platform is very smooth, the authentication is fast and reliable, and I can retrieve the JWT token, 3LO, and 2LO.

    The benefit of using Okta Platform is that for authentication-related things, I don't have to consider build versus buy since this product is reliable for the majority of our applications, significantly reducing our time to develop authentication-related features.

    I have seen an improvement in our cloud-based workloads since implementing Okta Platform, which provides faster connections than traditional applications. Previously, I used Redis  cached and session-based systems, but through Okta Platform, I work with JWTs for a faster experience.

    What needs improvement?

    To improve Okta Platform, I think they should enhance the 2LO service-to-service aspect by integrating more features on the MCP side, allowing for authentication of containers running on the gateway. Instead of just client ID and secret, they could add a Vault-like storage for keys in integrated AWS services to smoothen the process.

    The deployment experience with Okta Platform is generally smooth. They provide Okta Preview for non-production deployments, and I suggest they implement a green and blue rollback mechanism in production to avoid any delays for application teams during real deployments.

    For how long have I used the solution?

    As a developer, I have been using Okta Platform for around four months. As an employee doing SSO and all, it has been more than a year, so it is around one year as an employee and four to five months as a developer.

    What do I think about the stability of the solution?

    Okta Platform is stable, as I haven't faced any authentication issues in the year I have been using it. It works smoothly even with hundreds of applications and hasn't encountered production issues.

    How are customer service and support?

    The customer service and technical support for Okta Platform at the enterprise level are good, as I primarily rely on consultants who manage these interactions effectively.

    Which solution did I use previously and why did I switch?

    Before choosing Okta Platform, I evaluated other solutions like AWS Cognito. The main advantages of Okta Platform are its JWT option, which is passwordless, and its good integration with Vault and Terraform , while Cognito lacks such features, leading to slower session-based processes.

    From the start in our application, I have been using Okta Platform and still maintain some session-based systems in the cache layer.

    How was the initial setup?

    I was not involved in the initial setup of Okta Platform. After the setup was completed, I have been using it for over a year, so I cannot comment on any challenges faced during the initial setup.

    What about the implementation team?

    I employed consultants from other organizations to assist with the deployment of Okta Platform, which has been effective.

    What was our ROI?

    Financially, I cannot provide specific data points for the return on investment with Okta Platform. However, technically, managing these aspects myself would incur server costs for generating JWT tokens and reliability improvements through the OAuth mechanism provided by Okta Platform reduce my technical load.

    Which other solutions did I evaluate?

    My company purchases Okta Platform through direct Okta, not through the AWS Marketplace . It is the Okta Platform Enterprise SaaS offering.

    What other advice do I have?

    My advice for companies considering Okta Platform is to make it more platform-agnostic. While Cognito is limited to AWS, Okta Platform's flexibility allows us to avoid being restricted to a single cloud provider. I would rate this review as a 9 out of 10.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Hardik Murdia

    Centralized authentication has simplified audits and strengthened compliance for finance workloads

    Reviewed on Apr 27, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My previous company did purchase Okta Platform  through the AWS Marketplace . When I was in Smarsh, they bought it from the AWS Marketplace  and were using the Single Sign-On  option with multi-factor authentication to ensure that whenever we tried to log into a system such as Bosch or Concur, the login happened via Okta Platform . Smarsh was primarily using Okta Platform via the AWS Marketplace, whereas  in my current organization is not using Okta Platform from AWS  services. We have purchased it directly from the vendor.

    In our case, the main use cases for Okta Platform include a Central Identity Provider where multiple SaaS tools are utilized along with many internal apps we have. We configured a Single Sign-On  option for everything, eliminating the need for users to remember different logins and information. This was something we configured in Smarsh, where a single login ensured that we were able to log in via Okta Platform only instead of doing individual logins for each screen. Every SSO login used one username and password for the SSO login, followed by an authentication layer. Based on the three-factor authentication combining username, password, and authentication, we were able to perform proper sign-in. This serves primarily for our multiple SaaS tools we have in our organization, as well as certain internal apps we are using.

    In our architecture, Okta Platform helps secure access to cloud infrastructure, APIs, and containerized workloads. We have not integrated GenAI in Okta Platform right now, but we have integrated it for our AWS  services, which has resulted in positive outcomes. After implementing proper user authentication, we can segregate user access effectively and also trace any malicious or bad actors in the company. Previously, we relied on common credentials for specific tasks, which resulted in downtime. Because of this, we introduced Okta Platform. We were using manual sign-ins with usernames, but when SSO was introduced, it made our lives easier.

    We are a FinTech company, and Okta Platform helps us address compliance and regulatory requirements effectively. There are numerous statutory regulations we have to follow, especially when dealing with finance customers such as larger banks, who have specific requirements to fulfill. Okta Platform has significantly aided us in this area as we can track each user, monitoring what they do and even obtaining their geolocation. For banking and finance purposes, it has proven to be very beneficial. Although I am not involved in healthcare or any other domain, I work solely in FinTech.

    What is most valuable?

    The best features of Okta Platform include Single Sign-On, which we have utilized. Beyond that, multi-factor authentication has been beneficial. User Lifecycle Management is also a key feature where everything is managed via Okta Platform itself, allowing us multiple ways to set policies and automate provisioning. We can onboard both customers and employees to our internal organization through this.

    Based on my use case, I was more involved in the team that managed Okta Platform for other teams. One problem we previously faced was multiple users coming to us with different forgot password issues, as we had an administrator sign-on for the forgot password situation. Before Okta Platform, all our logins were fragmented, leading to a lot of manual toil. After implementing Okta Platform with centralized authentication and policy enforcement on top of the existing sign-in approach, our workflow has become much easier. The best part is that manual toil has almost vanished.

    Since implementing Okta Platform, we have noticed measurable security and operational improvements in our cloud-based workloads. The best part is it is very easy to integrate as it has a huge app catalog which streamlines the integration process. I have never encountered issues with failed sign-ins due to external factors. As for our security posture, with MFA enabled, we have significantly reduced the common credential problems we previously faced. Because of all this, we ensure our security positioning meets all compliance standards, and whatever protocols are necessary are followed. Overall, from a security standpoint, it provides a better approach. With its extensive app catalog, integration is seamless; you just purchase it from the vendor and incorporate it into your system.

    What needs improvement?

    For Okta Platform to improve, I would suggest enhancing debugging for SAML, as we have faced issues using OIDC or SAML without any user-side tools to identify what is happening. This has become a significant challenge, particularly with SAML logins in the context of AWS usage. If the debugging process is made easier, it would greatly improve our experience. I also find the initial policy setup complex, as it can be a nightmare given its intricacy. Although I do not handle it personally from start to finish, I recall those complicated days vividly.

    For how long have I used the solution?

    Okta Platform usage has been around four years in Smarsh and one and a half years at my current organization, totaling approximately five years.

    What do I think about the stability of the solution?

    I have not experienced any downtimes or crashes. The only issue arises during SAML errors, which are tough to debug, but overall, I have not seen any downtime. When I check Okta Platform uptime, it seems to be above two nines.

    What do I think about the scalability of the solution?

    Throughout my experience, I have never noticed any downtime. Reliability is paramount, especially since I work as a Site Reliability Engineer, so both reliability and availability factors are critical. Okta Platform scales efficiently, and I have consistently observed its performance as quite fast, but my experience is only with the cloud solution.

    How are customer service and support?

    I have not utilized customer service and technical support much. My experience shows that it should be satisfactory. We received helpful responses and resolutions for the few questions we directed to them.

    Which solution did I use previously and why did I switch?

    Before choosing Okta Platform, we evaluated Azure  where we use Microsoft Intune  to register our devices. This alternative is also relatively cheaper for us since it is bundled with Microsoft services and has provided better ROI, but we still use Okta Platform for its effectiveness. We have a partnership with Microsoft in our organization, and they also sell out product in their marketplace. Okta Platform's sign-in features are especially good, offering proper pop-ups when signing in and providing easier access compared to Azure  currently.

    Before choosing Okta Platform, we mostly used manual logins for everything at my previous service company. When I joined Smarsh, they utilized Okta Platform logins exclusively. We even used shared credentials because we were more of a startup. As the company grew, we adopted Okta Platform based on an architecture suggestion, and this was integrated into our system smoothly without issues. In my current organization, we are using Microsoft login instead of Azure, but both solutions function similarly. However, I find Okta Platform preferable for Mac users.

    How was the initial setup?

    My experience with the deployment of Okta Platform indicates it is very easy to integrate; however, the configuration of policies is quite complex. We had to troubleshoot SAML assertion issues during quite a bit of integration, which was painful. The token expiration and refresh process also require careful handling as we faced numerous token expiration notifications through Slack.

    The initial setup process can feel overwhelming since while integrating Okta Platform is easy with the existing catalog, the complexity arises during policy configuration, which requires extensive research and adjustments. This is something that often feels problematic. Aside from that, the cloud solution integrates relatively smoothly; most challenges arise from policy settings.

    What about the implementation team?

    We did not use an integrator, reseller, or consultant for the integration process. Our internal team performed most integrations with minimal external assistance, relying primarily on the documentation provided after purchasing the solution. The documentation is straightforward and manageable, and we only needed to contact the support team a couple of times with questions. Overall, it was not a major issue.

    What was our ROI?

    If I want to quantify the return on investment with Okta Platform, I have certain metrics. It has reduced our login-related support tickets significantly, providing us with better visibility and reducing manual toil, which has almost been eliminated. Previously, we conducted numerous audits, but now the admin UI provides all necessary details about what, where, and how events occurred. Employee onboarding used to be a major pain point, but the automation Okta Platform provides for creating user accounts across various apps or SaaS tools has made our life much easier. Audit processes have also become simpler, especially in finance where compliance is critical. This is something most people experience with Okta Platform; it undoubtedly has a positive impact.

    What's my experience with pricing, setup cost, and licensing?

    Okta Platform is expensive. At scale, Okta Platform is costly. There is no question about that. However, I feel it offers quality. While it is not entirely justified, it is somewhere between 70-80% justified in terms of pricing.

    What other advice do I have?

    Okta Platform is a good solution to discuss. When advising other companies considering Okta Platform, I recommend analyzing the cost first, as it is a critical metric. For organizations with a large user base, it is essential to explore and understand potential expenses associated with Okta Platform. The pricing can be quite high for large-scale usage, so expenses should be considered carefully before committing to Okta Platform. Services are generally good, and no product is flawless, so there will be notable strengths and weaknesses to consider, such as token and SAML troubleshooting issues. With our company's tuned MFA, we have alleviated many issues, but without it, problems can arise for several employees. Okta Platform is not deployed on-premise; everything is on the cloud. I would rate this review as an 8 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    reviewer2818359

    Strong authentication has improved secure access for cloud apps, APIs, and hybrid environments

    Reviewed on Apr 21, 2026
    Review from a verified AWS customer

    What is our primary use case?

    As part of Identity and Access Management  solutions, or IAM , that many organizations use, Okta Platform  is a mature cloud-first IAM  platform that uses many single sign-on methods. This is one use case for applications, along with MFA and federation across SaaS and custom applications.

    Okta Platform  helps to secure access to cloud environments, APIs, containerized workloads, and AI/GenAI services in my architecture by allowing me to create the application in Okta Platform and assign it to the right users and groups, then start configuring the authentication. The first step is multi-factor authentication, which helps secure that only the approved users and groups are allowed to use that application, whether it's an AI application or an on-premise organization application. Another important measure to avoid attackers from gaining users' credentials, such as passwords, involves single sign-on. Additionally, Okta Platform has an adaptive access policy, meaning the user, or employee in this case, does not need to remember the password. Once the administrator configures SSO , the user does not need to go through password authentication; if they are authenticated using MFA, it works directly.

    The use of Okta Platform to protect non-human identities in my environment, such as service accounts, machine-to-machine access, or AI agents, is limited since in the organization I work for at Deloitte, we use Microsoft for that. Okta Platform is a great IAM  solution, but it is not an IGA solution, short for Identity Governance. The first thing an organization needs to look at is to understand their use case: do they need IAM or IGA or do they only need IAM? Because if it's only IAM, Okta Platform is good, but if they also need IGA to govern non-human identities and others, it is not a solution for that.

    Okta Platform helps to address specific industry or regulatory requirements such as healthcare and financial services in my cloud environment. For instance, it benefits the banking industry and the e-commerce industry as well. However, it is available for many industries because it's a very mature and cloud-first IAM platform, making it perfect for companies or startups that are just starting out; they don't need to go through on-premise setups.

    What is most valuable?

    What I like about Okta Platform includes its large, pre-built application integration catalog, which is very useful. It also has strong support for the SAML standard and OpenID, commonly referred to as OIDC. Additionally, it offers good API and extensibility for custom use cases and works well in hybrid and multi-cloud environments.

    The main benefits that Okta Platform brings to the table include strong authentication, which is the first thing, and adaptive MFA, which is very good. For example, if someone tries to log in from a country that is different from the countries they typically sign into, then Okta Platform will ask them to perform another authentication to verify that it is, in fact, the same user. Strong authentication is crucial, along with federation that I used for both cloud and on-premise systems. Federation worked very well, and it facilitates fast SaaS onboarding, with application templates in Okta Platform which make the whole configuration easier. Coming from a Microsoft background, I appreciate how Okta Platform is vendor-agnostic, meaning you do not need to depend on anything; it can work with any identity or identity governance vendor.

    I noticed measurable security and operational improvements in my cloud-based workloads since implementing Okta Platform. It is very stable; we didn't have many errors when it came to users trying to log in, which is the first thing. Federation also worked, and that's one use case I can say I used it for. I had a client that was an organization with over 5,000 employees, and they wanted the authentication to go for Microsoft, but through Okta Platform. In reality, what happens is the user tries to log into an Okta Platform application and then gets redirected to Microsoft. That is federation, which refers to redirecting them to a Microsoft page. Once they complete the right authentication, they are redirected back to Okta Platform, making it a successful use case for a large organization in the insurance industry.

    What needs improvement?

    While there are many good things about Okta Platform, I would like to see improvements, especially in the IGA capabilities, which are limited compared to more dedicated IGA tools. I believe adding this would give them a real benefit. Additionally, it is not designed as a privileged access management solution, referred to as PAM. As I come from a Microsoft background, I see that Microsoft has both IGA and PAM capabilities, which Okta Platform lacks. Another area for improvement is pricing; it becomes complex and expensive when you add features. I would like to see licensing transparency, possibly some cost control notifications. Lastly, better policy visualization would be nice to have, showing how the policies configured can be represented more visually.

    For how long have I used the solution?

    I have been working with Okta Platform for the past year.

    What do I think about the scalability of the solution?

    When it comes to scalability, I find that Okta Platform's performance is very good. That's the whole point. As soon as you scale up, it often comes with additional costs, but that worked perfectly for us. We managed to implement it for a large organization with many users, so there was no problem; it was very stable.

    How are customer service and support?

    I would evaluate customer service and technical support for Okta Platform by noting that we did need assistance once when we blocked ourselves out and had to contact Okta Platform support. It took about two days for them to respond, which I think is reasonable. However, this also depends on the support license that you have. We had the minimum one, but still, two days is acceptable as they helped us resolve the issue.

    How was the initial setup?

    My experience with the deployment of Okta Platform is that the initial setup is straightforward for standard use cases such as fast SSO  and MFA. However, complex environments such as hybrid AD, custom applications, or lifecycle automation require careful design and skilled implementation to avoid the technical debt that's often referenced.

    What was our ROI?

    Regarding the pricing of Okta Platform, while it is high and complex, I find it does bring a return on investment. The important thing is for companies to evaluate the total cost and not just the base licensing because once you add more features, the total cost increases. This evaluation varies based on the organization's use case; if it's below around 100,000 users, it should be fine. However, if you plan to go beyond that, evaluating the total cost becomes crucial.

    Which other solutions did I evaluate?

    I decided to switch to Okta Platform for different use cases for different organizations, particularly at Deloitte. We noticed that many of these organizations that are very Microsoft-heavy, meaning they have many products with Microsoft, find that Microsoft Entra ID , which is an IAM and IGA solution, fits them perfectly because they are already in that Microsoft ecosystem. However, for organizations that are not heavily involved with Microsoft, then Okta Platform is a great solution because they do not need to be dependent on any vendor. It's cloud-first, and so if you need specific IAM without being tied to Microsoft, I think Okta Platform is the best alternative.

    What other advice do I have?

    Given my experience with Okta Platform and with other technologies, my advice to other organizations considering it is to clearly define if they want IAM versus IGA requirements as early as possible. Okta Platform is not a full IGA platform, and organizations need to understand that coming in. They should also evaluate the total cost and not just the base licensing. Lastly, if they are Microsoft-heavy organizations, they might consider Microsoft Entra ID , but if they are not deeply tied to Microsoft, then definitely go with Okta Platform. I would rate my overall experience with Okta Platform as an eight out of ten.

    AmitRathod

    Identity platform has unified access, automated lifecycle tasks, and strengthened cloud security

    Reviewed on Apr 17, 2026
    Review from a verified AWS customer

    What is our primary use case?

    I have been using Okta Platform  for almost four years. In my current organization, I use Okta Platform  as a cloud-based IAM  platform for purposes like Single Sign-On , multi-factor authentication, lifecycle management, as well as for universal directories. It provides secure, automated user provisioning and access to applications for employers and customers, and it is also useful for risk authentication and API access management. Okta Platform is an AI-driven technology that detects threat-related models, signaling if anything potentially harmful might occur. Thus, there are various uses for Okta Platform.

    Okta Platform protects non-human identities in my environment, including service accounts, machine-to-machine access, and AI agents. Regarding non-human identity protection, the ServiceNow  team creates a non-human identity that flows into Okta Platform and generates a generic password for them. It helps manage our service accounts and includes customization features that enable these non-human identities to automatically activate their passwords every 60 days and restrict logins to approved systems only, not from personal or any other devices.

    Okta Platform helps to address specific industry and regulatory requirements in my cloud environment, including usage within the banking sector, finance sector, and one of the large logistics sectors. We also have a client in the pharmacy sector where we use Okta Platform as a complete end-to-end product.

    For Okta Platform deployment model, I am using AWS . I have integrated and secured AWS  services through Okta Platform by utilizing Single Sign-On  for application integration and using Terraform  for project deployments.

    What is most valuable?

    The best features of Okta Platform include Single Sign-On, which offers one-click access for thousands of cloud and on-premise applications, and great lifecycle management. It automates user provisioning and de-provisioning, managing the entire identity lifecycle from onboarding to offboarding. Additionally, it provides excellent scalability along with device and administrative tools management, making Single Sign-On and lifecycle management the standout features.

    Using Okta Platform, we can utilize almost 7,000 pre-built integrations with popular applications. It provides easy and customizable configuration based on client requirements, allowing for development of user onboarding, offboarding, and updating processes. There are numerous API features, including passwordless authentication and B2B customer identity with a CIAM  feature. Okta Platform secures APIs to control access and protect sensitive data, enabling users to reset passwords or unlock accounts without IT intervention. Moreover, it offers standard and custom reports to monitor access, ensuring compliance and visibility into potential security risks.

    Okta Platform helps to secure access to cloud infrastructure, APIs, containerized workloads, or AI/GenAI services in my architecture by utilizing two modules: Identity Threat Protection (ITP) and identity governance and automation. ITP analyzes login patterns, device posture, and network data to detect anomalous activity, and it enables universal logout for instant revocation of access tokens across all supported applications if suspicious behavior is detected. The shared signals framework, along with Log Investigator and natural language processing, allows admins to query system logs in plain English for quicker investigations. In terms of identity governance and automation, it analyzes user roles and activity to recommend the least privileged access, optimizing governance policies and generating summaries of user access rights for access certification reviews.

    What needs improvement?

    While I see very few areas for improvement in Okta Platform, I do note its high cost, which can be particularly challenging for smaller organizations looking to utilize advanced features like Okta Workflows. Additionally, there are reporting limitations, as some users find Okta Platform's built-in reports less detailed compared to competitors. Furthermore, frequent multi-factor authentication prompts can cause MFA fatigue, disrupting user experience. Lastly, there is limited on-premise support, which, while robust in the cloud, is often expensive to manage for legacy on-premise applications, making these features candidates for enhancement.

    For how long have I used the solution?

    I have been using Okta Platform for almost four years.

    What do I think about the stability of the solution?

    In terms of stability, I faced some issues in 2022, but for the last three years, there have been no scalability problems. Okta Platform efficiently supports scalability, allowing for extensive individual tenants within a single environment, as well as onboarding and offboarding processes for thousands of applications. Clients can scale their API access requests beyond default limits, which is adaptable according to requirements without impacting performance or deployment.

    What do I think about the scalability of the solution?

    In terms of stability, I faced some issues in 2022, but for the last three years, there have been no scalability problems. Okta Platform efficiently supports scalability, allowing for extensive individual tenants within a single environment, as well as onboarding and offboarding processes for thousands of applications. Clients can scale their API access requests beyond default limits, which is adaptable according to requirements without impacting performance or deployment.

    How are customer service and support?

    I would rate Okta Platform's tech support and customer service as an eight out of ten, as their availability can be rare and requires scheduled calls, often taking a significant time to receive solutions. However, the support provided is generally very good.

    Which solution did I use previously and why did I switch?

    Before adopting Okta Platform, I had used OneLogin  and Entra ID for identity and access management, specifically for privileged access.

    How was the initial setup?

    The deployment experience with Okta Platform varies based on client requirements. For large-scale applications, it took almost two to three months, while small-scale organizations required around six to seven days. I have not faced issues during deployment; it has consistently met our clients' expectations.

    What about the implementation team?

    For deployment, our AWS DevOps team works on the deployment-related aspects and supports the workloads secured by Okta Platform.

    What was our ROI?

    Since implementing Okta Platform, I have noticed measurable security and operational improvements in our cloud-based workloads. Initially, we faced complex implementation challenges, but now it supports much faster and easier implementation and deployment in production, thanks to AI utilization. We resolved earlier centralized risks, and credentials are now managed in a very encrypted manner, which has improved performance and security.

    What's my experience with pricing, setup cost, and licensing?

    I find Okta Platform cost-effective and worthwhile to purchase due to its vendor-neutral nature, supporting thousands of pre-built integrations with third-party applications. It is highly flexible with adaptive MFA, includes user behavior analytics and custom workflows, which many competitors do not offer. Its granular and easily configurable policy engine, along with a strong lifecycle management process, makes it worthy of investment for any organization despite its cost.

    Which other solutions did I evaluate?

    I evaluated OneLogin  and Entra ID before choosing Okta Platform.

    What other advice do I have?

    My advice for organizations considering Okta Platform is that if cost is not a concern, they should definitely opt for it, as it features excellent user lifecycle management, identity governance, re-certification, user provisioning, and strong Single Sign-On functionalities. I would rate this review as a nine out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    View all reviews