Listing Thumbnail

    Okta Platform

     Info
    Sold by: Okta, Inc 
    Deployed on AWS
    Free Trial
    AWS Free Tier
    Secure your employees, contractors, and partners - wherever they are. Covers every part of the Identity lifecycle, from governance, to access, to privileged controls.
    4.5

    Overview

    Play video

    Okta Workforce Identity delivers a unified identity security platform that protects customer environments before, during, and after authentication and with continuous assessment of user and session risk. By offering an integrated and multi-layer security approach that enables you to view, monitor, and remediate more easily, Okta helps reduce the likelihood of breaches and compliance challenges in your organization with features including:

    • Single Sign-On: Secure cloud single sign-on that IT, security, and users will love. Deploy SSO across applications, including AWS SSO.
    • Universal Directory: One directory for all your users, groups, and devices.
    • Lifecycle Management: Automate management of the employee lifecycle, including provisioning of users and groups into AWS SSO.
    • Adaptive Multi-Factor Authentication: Protect your organization with an intelligent, phishing-resistant authentication.

    To help you more easily plan and progress along your unique identity security journey, Okta has introduced solution-based packages, Okta Workforce Identity Suites, that match your identity security needs so that you can realize the value of Identity sooner. The four suites are:

    1. Starter: Starting your Identity journey? Put a strong foundation in place. Includes: Universal Directory, Workflows (5 flows), Single Sign-On, Multi-Factor Authentication (MFA)

    2. Essentials: Want to keep Identity at pace with growth? Get more must-haves. Includes everything in Starter plus: Workflows (50 flows), Adaptive MFA, Lifecycle Management, Access Governance, Privileged Access. The Essentials Suite can be scaled back for access management or governance needs only. Inquire for details.

    3. Professional: Looking to scale? Add device access & AI-powered intelligence. Includes everything in Essentials plus: Workflows (unlimited flows), Device Access, Identity Threat Protection with Okta AI, Identity Security Posture Management, Sandbox. Inquire for pricing.

    4. Enterprise: Need end-to-end security? Leverage real-time detection and response. Includes everything in Professional plus: API Access Management, Access Gateway, Machine-to-Machine Tokens. Inquire for pricing.

    For more details on pricing, check the pricing section or visit the Okta website: https://www.okta.com/pricing . Note that all suites require an $1,500 annual contract minimum and are billed annually. Suites can be enhanced with further add-ons which can be viewed on the Okta website: https://www.okta.com/pricing/add-ons .

    For Professional, Enterprise or other Custom Configurations or Volume Pricing via Private Offer, please contact us at: <www.okta.com/awsmarketplace >.

    Highlights

    • Turn Identity into a business advantage: Empower your people, protect your organization, and accelerate your business with an Identity-first security solution built for todays dynamic workforce.
    • Build the tech ecosystem of your choice: Never again worry about building or maintaining your SSO integrations. Okta takes care of that with the largest network of over 7000 pre-built cloud and on-prem apps available, so you can build the tech ecosystem you need, and set up access immediately.
    • Okta Workforce Identity Suites: Mature your identity security with the Okta Workforce Identity Suites, solution-based packages. These suites provide paths to mature your identity posture, in phases - without the complexity of selecting individual tools.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Trust Center

    Trust Center
    Access real-time vendor security and compliance information through their Trust Center powered by Drata. Review certifications and security standards before purchase.

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Starter - 100 users
    Starting your Identity journey? Put a strong foundation in place.
    $7,200.00
    Essentials - 1,000 users
    Want to keep Identity at pace with growth? Get more must-haves
    $204,000.00

    Vendor refund policy

    All orders are non-cancellable and all fees and other amounts that you pay are non-refundable. If you have purchased a multi-year subscription, you agree to pay the annual fees due for each year of the multi-year subscription term.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Support

    Vendor support

    Through our expert teams and robust digital resources, we ensure you can always access urgent and proactive support, whenever and however you need it, anywhere in the world. Access the Okta Community to get help, engage with us and your peers, submit product requests, and access the key resources you need to drive success. We offer support packages that are aligned to your requirements to give you the power of choice. For additional information please visit https://support.okta.com/help . For additional information please visit https://support.okta.com/help . You can also email support@okta.com .

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Infrastructure as Code, Application Development, Security
    Top
    100
    In Applications
    Top
    100
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Single Sign-On
    Secure cloud single sign-on deployment across applications, including AWS SSO integration.
    Adaptive Multi-Factor Authentication
    Intelligent, phishing-resistant authentication with continuous assessment of user and session risk.
    Identity Lifecycle Management
    Automated management of employee lifecycle including provisioning of users and groups into AWS SSO.
    Universal Directory
    Centralized directory for all users, groups, and devices with unified identity management.
    Pre-built Application Integrations
    Over 7000 pre-built cloud and on-premises application connectors for immediate access setup.
    Single Sign-On (SSO)
    Automatically synchronizes users across multiple directories to enable one-click access to corporate applications on-premises and in the cloud with enforced security policies and self-service password reset capabilities.
    Multi-Factor Authentication (MFA)
    Supports multiple authentication methods including passwordless authentication, passkeys, one-time passcodes, push notifications, biometric data, and security keys with real-time reporting and monitoring of authentication events.
    Adaptive Authentication
    Delivers multi-layer, context-aware and risk-based protection to minimize common attacks and enforce contextual access security policies based on user behavior and risk assessment.
    Identity Lifecycle Management
    Provides role-based user provisioning engine with granular access permissions, least-privileged access controls, and automated user account provisioning across applications and AWS services.
    Directory Integration
    Acts as a secure cloud-based directory with integration capabilities for Active Directory, LDAP, G Suite and other external directories, plus pre-built connectors with thousands of third-party web applications and AWS services including AWS IAM, AWS SSO, Amazon Cognito, and Amazon EventBridge.
    Single Sign-On Capability
    Enables one-click secure access to applications and resources including AWS IAM and AWS SSO
    Adaptive Multi-Factor Authentication
    Supports context and risk-aware authentication methods with passwordless user experience options
    Web Session Security and Monitoring
    Protects identities beyond login and provides visibility into user actions within web applications
    Identity Lifecycle Management and Automation
    Automates identity lifecycle events, orchestrates identity workflows, and streamlines access reviews and compliance requirements
    Cloud Directory and User Management
    Leverages scalable cloud directory to unify user management across enterprise and reduce identity silos

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.5
    1149 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    74%
    21%
    3%
    0%
    1%
    7 AWS reviews
    |
    1142 external reviews
    External reviews are from G2  and PeerSpot .
    Snidam Snidam

    Automated lifecycle management has cut onboarding times and now drives secure, clean access

    Reviewed on Feb 18, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I have hands-on experience with Okta Platform  for a little over three years, starting in 2023, integrating SaaS apps with SAML, OIDC, enabling MFA, including WebAuthn and FIDO2, and building group-based assignments.

    Since then, I have day-to-day admin tasks including app onboarding, policy tuning, certificate and metadata rotation, lifecycle automation, HR-driven processes, and troubleshooting SSO  issues end-to-end, including IDP  and SP log attribute mapping and role entitlements.

    The main use case is centralized SSO  and MFA for internal apps with event-driven lifecycle automation and JML to enforce least privilege and clean deprovisioning. Some examples from a typical day include onboarding new hires every morning via HR events from Workday , ensuring the right access is provided and provisioning automatically to enforce MFA while keeping auditors happy regarding least privilege and SOD.

    The HR trigger, such as Workday  pushing a new hire to our IAM  workflow, allows Okta Platform  to serve as the IDP  and source for app access, mapping job codes and departments to Okta Platform groups, such as sales to US finance analyst, while integrating apps toward Snowflake  with read-only permissions. After integrating apps, the SSO setup gets done with SAML or OIDC protocols with Okta Platform as the IDP, validating NameID, subject format, sign, and encrypt settings while rotating all SP or IDP certificates as per schedule.

    Subsequently, MFA and conditional access are arranged where policies require Okta Verify push on everything we engage with. We also manage attribute governance by maintaining profile mapping, including username, email ID, and department entitlements. App rules are assigned via groups, followed by monitoring and troubleshooting, ensuring a smooth deprovisioning process. For leavers, Workday termination revokes Okta Platform account and app assignments immediately, resulting in new hires being productive on day one while keeping admin efforts low and long ticket trails rare.

    Automation has acted as a force multiplier for my workload and my team's efficiency. We moved from ticket-driven manual steps to a predictable policy-driven flow, making onboarding faster, cleaner, and far less noisy.

    Okta Platform has positively impacted my organization through measurable risk reduction, faster onboarding, and fewer tickets. The concrete data indicates that the onboarding cycle time reduced by 50 to 60%, from one to two working days down to two to four hours for most SaaS apps. The day-one access rate has increased from 78 to 96%, with a relative score for new hires having required apps by 9:00 AM on their start date. Furthermore, the ticket volumes have fallen by 30 to 40% over the quarter.

    What is most valuable?

    The best features offered by Okta Platform that stand out most to me in my day-to-day work include Universal Directory and profile mapping, which matter as they form the foundation for clean attribute-driven access. I can normalize identities from HR and AD, map attributes once, and drive consistent entitlement across apps.

    Additionally, features including group rules, dynamic assignments, SSO with robust protocols supporting SAML and various OIDC integrations, excellent provisioning, deprovisioning capabilities, adaptive MFA, WebAuthn, and efficient system and troubleshooting tools also stand out.

    Universal Directory and profile mapping help me with day-to-day identity management by serving as the backbone for keeping identity data clean, consistent, and automation-friendly. Practically, Universal Directory acts as a single source of truth for users, allowing us to aggregate attributes from HR, Workday, AD, and other sources into a single Okta Platform user profile. This normalization standardizes formats, such as email in lowercase and phone numbers in E.164, preventing downstream apps from breaking due to case sensitivity or formatting.

    Profile mapping enables me to transform attributes once, such as concatenating first.last for usernames, deriving different manager emails, and reusing them across all apps. This creates clean, predictable attributes driving group rules, which in turn govern app assignments and SCIM provisioning, making the JML process work efficiently without the need for tickets.

    Okta Platform Integration Network's capability to enable faster deployments serves as a force multiplier for speed and risk reduction when it is mature and well-curated. It essentially turns a lot of custom work into configuration, which results in gains in deployment speed and reliability.

    I assess the role of Universal Directory as a single source of truth for user identities in my organization as central to how we enforce identity hygiene and drive automated access. Its role functions as an authoritative profile and policy engine that normalizes identity data and pushes clean, consistent attributes downstream. We utilize it for data aggregation, normalization, profile mapping and precedence, attribute-driven access, federation claims, and policy enforcement. The measured outcomes with Universal Directory in the middle indicate that onboarding lifecycle durations dropped by more than 30 to 40%, with late access-related tickets falling by the same percentage, around 35 to 40%.

    What needs improvement?

    Although I am a fan of Okta Platform overall, there are areas where it could improve security outcomes and reduce admin friction. My top improvement areas include the system log and analytics upgrade, which are great for point troubleshooting, but trending and root cause analysis across large tenants still require exporting to SIEM . Verbose queries and long-range retention costs can add up. Additionally, while certificate rotations are better than most, the process is still manual for busy portfolios, especially concerning multi-SP SAML certificate rotations and app metadata drift.

    Two more buckets of potential improvements for Okta Platform involve user experience and security. There is the issue of push fatigue and prompt sprawl, where users receive multiple prompts across different apps and sessions.

    I arrived at the rating of eight because the core controls are strong and reliable, but a few operational UX and UI gaps prevent it from being rated higher. The reasons for not giving it a nine or ten include ongoing issues concerning safety and change safety, the complexity of group rules and mappings, and the lack of robustness in policy management. Additionally, there remains a need for more manual involvement than necessary, especially for large portfolios and dual certificate rotation, along with proactive SP data metadata validation.

    For how long have I used the solution?

    I have been working in my current field since April 2023, with a little over three years of experience in that time.

    What do I think about the stability of the solution?

    Okta Platform is stable on an enterprise scale; however, scalability ultimately depends on how one architects and operates the system.

    What do I think about the scalability of the solution?

    The scalability of Okta Platform is impressive, but its effectiveness relies on how integrations are designed, rate limits are handled, and day-to-day operations are managed. Customer support is generally reliable, featuring clear tiers with excellent assistance during roll-outs if the right plan is chosen and SLAs are well defined. Best outcomes emerge when paired with strong internal runbooks and partner support.

    How are customer service and support?

    Overall, customer support tends to be dependable, but the real experience will depend on the support tier selected and the level of preparedness.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Before adopting Okta Platform, we utilized a homegrown SSO system employing ADFS for certain apps and direct LDAP binds for others, alongside a few apps with local accounts.

    How was the initial setup?

    Automated lifecycle management has transformed my onboarding and offboarding efficiency significantly. Previously, onboarding felt toward a bottleneck, and offboarding raised risk concerns. Before implementing the Okta Platform-driven lifecycle, HR would create a ticket in ServiceNow , and three different teams would manually provision AD, email, and six to eight SaaS apps, which typically took around one to two business days, during which errors frequently occurred, including wrong groups and missed deprovisioning, resulting in no clean audit trail.

    Offboarding was even worse, with terminations after hours sitting until the next day, creating 12 to 24-hour orphaned account windows across key apps. The task was to automate the entire JML process end-to-end. After integrating Okta Platform and linking HR to serve as Okta Platform UD, mapping everything, and designing attribute-driven access with SCIM provisioning while implementing movers logic, the results were remarkable. The time-to-access dropped from one to two days down to two to four hours for SCIM provisioning, improving day-one readiness from 78 to 96% for new hires. Manual provisioning tasks fell by 55%, allowing the IAM  team to reclaim 10 to 12 hours per week to focus on governance and SOD areas.

    This transformation allowed HR hires in Workday to auto-create the Okta Platform user, with Universal Directory attributes driving the assignment seamlessly.

    What about the implementation team?

    My impression of the automated threat response feature in Okta Platform AI is that it brings net positive results concerning both speed and containment when tuned appropriately. It shortens the time from suspicious signals to protective actions, practically reducing risk without overwhelming the SOC with noise.

    What was our ROI?

    We have seen a return on investment with clear metrics that demonstrate both hard savings and reduced risk.

    What's my experience with pricing, setup cost, and licensing?

    Pricing for Okta Platform has proven to be straightforward, with no challenges encountered. As a fully SaaS solution, everything is pre-built and managed by Okta Platform. The costs come down to paying for subscriptions, professional services, and ongoing operations, specifically licensing workforce identity with SSO and adaptive MFA for all employees, along with add-ons towards Lifecycle Management for JML automation at scale, Advanced Server Access for Linux and Windows servers, and IGA  for access certification indicating SOD. The pricing per-user list drops when user counts rise and with multi-year commitments.

    Which other solutions did I evaluate?

    In evaluating options prior to choosing Okta Platform, we ran a structured assessment comparing various solutions such as ADFS, Duo plus manual JML, and also considered alternatives including Microsoft Entra ID  and Ping Identity.

    What other advice do I have?

    My advice for teams considering Okta Platform is to start with clear objectives and metrics, defining what success looks like to ensure effective implementation. I am providing this review with an overall rating of eight.

    Shubham Gutte

    Automated user onboarding has transformed how our organization manages access and authentication

    Reviewed on Feb 18, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My use case for Okta Platform  is that we mostly use it for SSO  for the applications we have integrated with Okta. We primarily use SSO  for user authentication, and user management is not particularly involved, but we are importing users from Active Directory to Okta.

    I assess the role of Universal Directory as a single source of truth for our user identities by stating that there is an application called Workday , and from Workday  to SailPoint, Okta Platform  will be the target system for SailPoint. When a user joins the organization, aggregation runs from HRMS to SailPoint, which is responsible for creating the birthright application, with AD being one of those. Once the user is created in AD, import jobs will run based on the mapping we did with AD and Okta Platform, and the user will be created in Okta Platform.

    What is most valuable?

    The best features of Okta Platform include the import feature, which allows for new employees joining the organization to have their AD account created, and when this import runs from AD to Okta Platform, this employee will be created in Okta Platform. This feature represents automation between Okta Platform and AD.

    Apart from these features, I appreciate that there are password policies and authentication policies or network zones we can configure in Okta Platform. If we want to restrict the users from logging in from specific network zones or blacklisted ones, we can configure those.

    The context-aware policies of adaptive MFA influence my authentication process because we can enable more MFA based on client requirements. Okta Platform is one of the MFA tools available, alongside others such as RSA, and based on the requirements, we can enable those and apply the policy accordingly.

    The positive impact I have seen from using Okta Platform is that it makes it easier for new joiners to get birthright access and have users added based on department or employee type. We implement rules and policies, such as when a user joins the sales department; we can configure the group rule, and the user will automatically be tagged to that specific group. This represents an automated process with Okta Platform, rather than doing it manually.

    The automated lifecycle management helps with the efficiency of onboarding and offboarding by ensuring that once a user joins the organization, they come into HRMS. From there, it goes to AD, and the target will be Okta Platform. Birthright access and applications are provisioned based on conditions. For offboarding, if an event is triggered, such as leaver or termination, values will be populated in AD, and once the import runs, Okta Platform will terminate the user, disabling access and removing whatever accesses the user had.

    What needs improvement?

    In Okta Platform, I do not see much room for improvement because currently, they are managing automations and the new workflow, which helps with automation. Previously, this was not available in Okta Platform, but it was introduced recently.

    The automation aspect can be improved.

    For how long have I used the solution?

    I have been using Okta Platform for three and a half years.

    What do I think about the stability of the solution?

    The stability of Okta Platform, I would say, is an eight because it is growing day by day. Previously, it had static features without automation, but currently, it is moving towards automation and introduced workflows.

    What do I think about the scalability of the solution?

    I would consider the scalability of Okta Platform to be a six.

    The scalability rating of six is due to factors that come with the tenant and the specific elements around that, which I am not entirely sure about.

    How are customer service and support?

    My relationship with the vendor is as a customer and partner. When we have issues with Okta Platform, we reach out to their support team, and they take care of the issues we encounter.

    We do not go through AWS , GCP, or Azure  for Okta Platform; instead, we usually access the Okta Platform support portal to raise our concerns, and the team reaches out to us to resolve those issues, sometimes scheduling meetings as needed.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Before using Okta Platform, I did not really use any other software, but I did consider Entra ID, which is most probably similar to Okta Platform. However, Okta Platform has a user-friendly interface and is easy to use.

    How was the initial setup?

    The integration aspects include that the capabilities come with modern protocols, making it easier for integration with various protocols and target systems.

    What about the implementation team?

    Integration capabilities of Okta Platform enable faster deployment, as they support modern protocols such as IDP  and SSO.

    Which other solutions did I evaluate?

    I have not used Okta Platform AI, but I need to check on its automated threat response features.

    What other advice do I have?

    Regarding pricing for Okta Platform, I am not aware of how much it costs because I used to work as a consultant for them, and the licensing details are taken care of by the sales team or others.

    The solution requires little maintenance, and I would say it is easier to maintain compared to other IM  platforms such as SailPoint, which had huge coding and infrastructure costs.

    My advice to others looking to implement Okta Platform is to definitely go for the software instead of Entra ID, as it offers a much easier and user-friendly UI.

    reviewer9216065

    Centralized identity has streamlined zero trust access and automated user lifecycles

    Reviewed on Feb 12, 2026
    Review provided by PeerSpot

    What is our primary use case?

    We had a bunch of Active Directory servers, Windows Active Directory servers on-premises. We did an Okta Platform  agent installation on those servers to synchronize the identities from Active Directory to Okta Platform . We then leveraged that integration and configured it as an Identity and Access Management  and SSO  solution.

    I used Okta Platform as Identity and Access Management , which served as the source of truth for every single application entitlement and role-based access. Role-based access was a particularly important feature. Multi-Factor Authentication was essential, and I am using and consuming a lot of those even today for a couple of applications, though I am not managing that particular Okta Platform instance as it is managed by a third party. Identity and Access Management, Multi-Factor Authentication, role-based access, and SSO  were all critical components, serving as the source of truth for the entire application footprint. I also used Okta Platform for Zero Trust Network Access  on the consumer side, which was a Palo Alto engine that I integrated with Okta Platform.

    Okta Platform is a SaaS service, not something which you have to host yourself on-premises. Of course, you need agents to synchronize if you are already moving from a traditional on-premises identity-based architecture. Okta Platform is SaaS-based. While there are competitors such as Ping Identity, which used to be a great one but has since been acquired, and Microsoft Entra, which does all of it as well, Okta Platform has a lot of advantages. Okta Platform has very rich integration capabilities with a lot of other vendors, including deep integration capabilities with Zscaler, CrowdStrike, most of the ZTNA  vendors, and CASB  vendors. The number of applications that you can natively integrate with it out of the box is quite huge. Another advantage is the risk-based authentication capability, where Okta Platform gives you the capability to have step-up authentication based upon superhuman activity or unusual login detections. MFA is fairly seamless, and while it is not something that Okta Platform is doing alone as others are doing it as well, Okta Platform is stable with no issues with downtime or maintenance. I never had any challenges with that. The rich integrations are a significant advantage.

    What is most valuable?

    Context-awareness is more about not just the username or service principals, but also depends upon where and how that particular user is accessing things from. If a particular user changes the endpoint from which they are trying to log in or changes location quite abruptly within a span of few minutes, which is superhuman activity, then that additional context gets captured. You get a true risk-based authentication wherein you have to satisfy more authentication parameters or factors before you can actually get access to the resource.

    At the same time, you can also do a lot of conditional access things where if there is a certain level of risk associated with that particular authenticated session, then you can actually restrict the level of access that that particular user can have so that you do not penalize the user just because some session is potentially risky. You can let the user have the ability to do at least the basic work or remediate things. Okta Platform is a full-blown Identity and Access Management solution, so it does send out attributes which can be passed from the identity to the service principle, which is your application. Depending upon that, you can let the application know that this particular user, because it is risky, is not going to be able to access the usual things, but maybe restrict the access. This is completely based upon the context of that particular user's authentication session.

    What needs improvement?

    Okta Platform does what it promises that it does. It is certainly all cloud-based as a SaaS solution. For enterprises which really prefer to have their own identity within their own perimeter, Okta Platform might not be the solution they might look for. Of course, there are ways you can get your dedicated tenant, especially for governments and federal agencies and all of those things. I have not tried those use cases. I think Okta Platform is the best of the class and appears consistently at the top of the Gartner report and other research.

    Based on the use cases I had, I was fairly happy with it. The PAM capabilities and attribute-based access controls, ABAC, represent a new paradigm. How practical that is for enterprises to deploy largely depends upon the use cases. There is always room for improvement, and it is not just for Okta Platform but typically for every single customer identity provider. There are a lot of other things the biometric and FIDO and all of those which can certainly be improved. However, that is more of a technological constraint rather than the vendor itself.

    For how long have I used the solution?

    I have experience working on Okta Platform Identity and Access Management and Secure Server Access. The earliest I remember was back in 2019.

    What do I think about the stability of the solution?

    Okta Platform is stable with no issues with downtime or maintenance. I never had any challenges with stability.

    What do I think about the scalability of the solution?

    Scalability is handled because Okta Platform is a SaaS solution, so it is infinitely scalable. I have account managers that get assigned to the account who make sure that the underlying infrastructure is there to support the need for a lot of user identities that will be getting deployed. I never had any outages. I would rate it like eight or nine.

    How are customer service and support?

    Support is great. You get in-line support by just logging into it. I never faced a lot of challenges. There were one or two instances where the MFA was a bit slow, but they took care of it very quickly.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    The earliest I remember was back in 2019 when I first worked on Okta Platform doing integrations with Zscaler Private Access and Zscaler Internet Access . We had a bunch of Active Directory servers, Windows Active Directory servers on-premises, and we did an Okta Platform agent installation on those servers to synchronize the identities from Active Directory to Okta Platform. I then leveraged that integration and configured it as an Identity and Access Management and SSO solution.

    Right now I am not using Okta Platform. I am currently using Entra ID, but I was a customer of Okta Platform until six or seven months ago.

    How was the initial setup?

    The initial setup is really straightforward. You get a tenant and you get in-line help. The documentation is very feature-rich. It is really straightforward. It takes time depending upon the number of identity providers that you need to integrate with, especially if you are doing a brownfield deployment. For a greenfield deployment, you just get a tenant assigned and start configuring it. It does not take a lot of time.

    What about the implementation team?

    I have not been asked about implementation teams. I am not even sure if that is a standard practice because Okta Platform sits in its own tenant and I do not think there is anything there.

    What was our ROI?

    The reason why I purchased Okta Platform was primarily to centralize Identity and Access Management because it was all scattered. From the identity and access governance standpoint, it made sense to not rely on scattered identity providers but to actually have a single centralized IDP . The ROI comes not from Okta Platform itself, of course, the platform enables it, but the thought process that goes into having all of the identities stored in one single tool, which eases a lot of your entitlements. You do not have to go into different places and give people entitlements. The identity and access governance timeline shortens drastically. Okta Platform has its own IAG as well, which is in-built. If you are a small or mid-sized company, you do not need to have a dedicated IAG and all of those things. Okta Platform can work alone. You can eliminate a lot of inconsistencies and sprawls with your existing tool stack if you move into this. Of course, it is true for Entra ID as well, but with Okta Platform, I think it is one solution that can take care of most of your identity and access related needs.

    What's my experience with pricing, setup cost, and licensing?

    You get a real value for your money. Whatever amount you spend, you get a bang for it. Okta Platform is decently priced. It is certainly not cheap, but the features that you get, the functionality that you get, and whatever use cases that you have, it definitely satisfies those. There are no hidden things there. Once you have deployed it, they do not ask you for buying other things for integration or just to take care of your use cases. I think they are selling whatever is worth it if you are putting it in.

    Which other solutions did I evaluate?

    The primary competitors I would think are Azure  Entra ID. Azure  Entra ID is one of the closest competitors. Both cater to different use cases. Based upon the use cases that I had, there were not a lot where one could do and the other could not. Both are in the same realm.

    What other advice do I have?

    Based on the use cases I had, I was fairly happy with it. The IAG, Identity and Access Governance , is one of the best features. You can use that for taking care of a lot of your entitlements. If there are people who are getting onboarded, such as bulk users getting onboarded which is true for most of the IT services industries where there are hundreds of people joining every week, and people getting offboarded, those automated lifecycle policies automate the entire thing. It not just removes or suspends your identities, but it also conveys it to the downstream applications. It is one of the best things that they introduced a couple of years ago. I would give Okta Platform an overall rating of nine out of ten.

    anupam k.

    Okta Makes Authentication and Login Management Seamless

    Reviewed on Feb 11, 2026
    Review provided by G2
    What do you like best about the product?
    We use Okta for authentication and login management.
    What do you dislike about the product?
    The initial setup is difficult, and we need to go through the documentation to get it working properly.
    What problems is the product solving and how is that benefiting you?
    We have a large user base, and based on authentication, users are able to log in. We use this for security purposes.
    reviewer1413921

    Single sign-on has simplified access and lifecycle management for all corporate applications

    Reviewed on Feb 07, 2026
    Review from a verified AWS customer

    What is our primary use case?

    It is for Single Sign-on and Multi-Factor Authentication.

    What is most valuable?

    It is very easy to log in to all my various corporate accounts through Okta Platform . This helps me because I do not need to have any password. I just simply log into Okta Platform  which has a single sign-on capability.

    This helps us whenever our employees, our new employees come into the company. On first login, when they come into the company, they have access to all our corporate accounts already once they have their corporate account. They can log into their various productivity and corporate applications. This helps ease the burden from our IT support team to have to onboard someone manually. When someone leaves the company, having an IT team have to remove their access one by one is a very difficult process. Okta Platform Lifecycle Management helps us offboard those employees who have left the company more easily.

    What needs improvement?

    It would be great if there were a way to save even my social media passwords and other passwords through Okta Platform and single sign-on through Okta Platform in the future. I do not think they have this capability just yet.

    For how long have I used the solution?

    I have been using this for six years.

    Which solution did I use previously and why did I switch?

    There were some alternatives like JumpCloud  and Ping Identity that we were evaluating. However, since we are a partner, we prefer Okta Platform. There is a bias towards Okta Platform.

    How was the initial setup?

    I would say the setup difficulty was in the middle, depending on circumstances. For us, it was quite simple because we had everything in place. We just needed to integrate the Single Sign-on and the directory with our Google Workspace  or our current IDP . It was pretty straightforward and took a couple of days.

    What's my experience with pricing, setup cost, and licensing?

    Regarding pricing, as mentioned, we are a partner, so we do get a special big discount as a partner versus other customers.

    Which other solutions did I evaluate?

    There were some alternatives like JumpCloud  and Ping Identity that we were evaluating.

    What other advice do I have?

    Okta Platform is a great product and one of the best. We are a partner and have been using it for six years. We have four engineers on our team. We do not use the PAM and do not need it. I would rate this product nine out of ten.

    View all reviews