I use Okta Platform as an administrator to set up new SAML and SSO apps. We also use the governance module as well. We also use the automation functions with workflows. We use it mainly as our main identity platform. I have been using it at all my past companies.
Okta Platform
Okta, IncExternal reviews
External reviews are not included in the AWS star rating for the product.
Unified identities have simplified secure access management and improved compliance
What is our primary use case?
What is most valuable?
What I appreciate about Okta Platform is that it is most of the time a very good no-code platform. It allows us to set up new SSO integrations quite easily, even if the app doesn't really support SSO natively. It is pretty easy to configure on Okta Platform.
Okta Platform has impacted my organization positively by providing convenience, first of all. There are no more different passwords for many different apps, since SSO doesn't really require password storing. Security has also improved because we eliminate a very big weak point that passwords represent. Additionally, we maintain control to ensure we only give access to the necessary apps to the necessary people.
What needs improvement?
I would definitely see improvements in the governance module of Okta Platform. The way we do certification of accesses, certification campaigns, and access requests could be improved. A better way for users to actually request an instance in Okta Platform, for example, an app, without having to use a third-party integration for ServiceNow or Jira Service Management, would be valuable. Having something built in to Okta Platform would be beneficial.
From the features perspective, functionality-wise, I would see recent features included in Okta Platform. Our company works on a hub-and-spoke model, and Okta Platform did introduce a way to have more of a federated level. What they call claim sharing, and we really would appreciate a bit more improvement on that functionality, since that functionality helps us to have a single identity on a hub and pass that identity to the other spokes and have seamless login between all of them. Claim sharing helps with that, but the function is still not the best, especially related to authentication policies. There are still some issues, especially when we have some mismatch between the authentication policies on different spokes. I definitely would appreciate some more improvements. Additionally, I would appreciate a bit more improvements on the logging features of Okta Platform, which still are not the best.
For how long have I used the solution?
I have been working with Okta Platform for more than five years at this point.
What do I think about the stability of the solution?
Regarding the Okta Platform, it has been stable. We do have different cells in different countries since we work on a hub-spoke model. On our EMEA cell, it has been quite stable. We did have some problems before on our US cells in these past few months, but nothing too serious. Most of the time, issues happen after hours on the US market. On our EMEA side, there have been no issues in these past few months.
What do I think about the scalability of the solution?
I find Okta Platform scalable and have not hit any limitations or scalability issues with it. We do have a good contract with our vendor that allows us to set up new users at any time and they basically review the contract a year after if we need to have more users. We really don't have scalability issues.
How are customer service and support?
If I would evaluate customer service and technical support of Okta Platform from one to ten, I would say a very good nine. We do have a very good relationship with our customer support representative, customer support manager in this case, or CSM. We also have a dedicated Okta Platform tech that we go to with more high-level questions. The level one support with the normal ticketing system from Okta Platform works pretty well most of the time. I never faced any issues, and if we need to escalate it for more complex issues, we can go to our dedicated tech manager support or our customer success manager and they are pretty quick to respond.
Which solution did I use previously and why did I switch?
I have mainly used Okta Platform. I did use a bit of Ping Identity, but it was so long ago that I really don't remember a lot of the platform at this point.
How was the initial setup?
When it comes to the deployment process of the initial setup with Okta Platform, we definitely faced some complexities, especially related to the way users authenticate. Sometimes authentication policies are a bit buggy in the sense that sometimes they really don't detect the correct browser that the user is using or there are issues related to the location of the user. The part of security authentication sometimes really doesn't work as well as it could. We did experience some problems in that sense.
What about the implementation team?
The deployment of Okta Platform was implemented fully in-house.
Which other solutions did I evaluate?
We did look at other solutions as well, such as One Identity and Ping Identity, before choosing Okta Platform. We decided to go with Okta Platform since it was the more complete option on the market at the time, with all the necessary functions that we had, especially related to authentication policies. It also had a better catalog of pre-built apps as well, so it was a bit more simple. We also started looking a few years ago to maybe replace Okta Platform with Entra ID, because we also did have Azure products, but we decided to keep Okta Platform because Okta Platform still has much more documentation and much more time in the market. Their solution is a bit better in that sense.
What other advice do I have?
My best piece of advice for others who are looking into implementing Okta Platform would be related to the knowledge base. I would make sure people read through the main knowledge base from Okta Platform, so the main steps of integrations. One of the good advantages of Okta Platform is that most applications and authentication are all the same, since it uses base protocols such as SAML or OIDC. If you are able to build one, the other ones are pretty easy to build. Go through the knowledge base that Okta Platform has, which is very rich for understanding if it is actually a good solution for your problems. If it is, Okta Platform would be a good solution to use.
The AWS services that are integrated or secured through Okta Platform mainly include AWS Cloud directly for cloud computing purposes.
Okta Platform does protect non-human identities in our environments, such as service accounts. We have the perspective that we can monitor the access, so who actually accesses the accounts and who is the manager of those accounts. We maintain password rotation and password policies for those types of accounts, which are different from a normal user account. Okta Platform helps us with that.
Related to the financial market, Okta Platform helps our company address specific regulatory requirements because we need to be SOX compliant, since we are a public traded company. Okta Platform helped us with being SOX compliant.
I have noticed measurable security and operational improvements in our cloud-based workloads since implementing Okta Platform. One of the main ones is access to AWS cloud environments. Thanks to Okta Platform, we can set up push groups to the AWS IAM module. We can actually give access to specific AWS spaces to specific teams in this case. For example, if we have a cloud team that works on a specific region, we can give access to an Okta Platform group to that specific team, and they will have access to that AWS cloud space. We have a lot of that, and it helped us a lot.
I would rate this review a nine overall.
Robust, Reliable SSO with Endless Okta Integrations
Big Performance, Seamless Integrations, and a Friendly UI
Centralized access has streamlined secure authentication and accelerated cloud integrations
What is our primary use case?
The main use cases for Okta Platform are authorization and authentication. From the SSO, I can understand if the person logging in is authorized to redirect to the correct URL. The second use case involves JWT token generation, which includes all the information about the user, such as SSO Gmail and other information about the permissions that person has. When I get that JWT from the code, I can access more user information and authenticate for other services using 3LO.
I haven't handled 2LO, which refers to service-to-service authentication. Okta Platform provides protection for non-human identities in our environment through 2LO, enabling services to call databases or APIs without human involvement, which allows M2M access. For instance, if an MCP gateway needs to access tools without human interaction, Okta Platform offers this option.
One example of how Okta Platform helps secure access to cloud infrastructure is through the AWS service called Bedrock Agent Core, where I can directly integrate with Okta Platform. AWS provides an option for this integration, allowing us to connect our API after authentication.
What is most valuable?
The best features of Okta Platform are fast authentication and smooth integration with AD groups. AD groups control the permissions people have in our enterprise through our in-house software called CIAM. This integration with Okta Platform is very smooth, the authentication is fast and reliable, and I can retrieve the JWT token, 3LO, and 2LO.
The benefit of using Okta Platform is that for authentication-related things, I don't have to consider build versus buy since this product is reliable for the majority of our applications, significantly reducing our time to develop authentication-related features.
I have seen an improvement in our cloud-based workloads since implementing Okta Platform, which provides faster connections than traditional applications. Previously, I used Redis cached and session-based systems, but through Okta Platform, I work with JWTs for a faster experience.
What needs improvement?
To improve Okta Platform, I think they should enhance the 2LO service-to-service aspect by integrating more features on the MCP side, allowing for authentication of containers running on the gateway. Instead of just client ID and secret, they could add a Vault-like storage for keys in integrated AWS services to smoothen the process.
The deployment experience with Okta Platform is generally smooth. They provide Okta Preview for non-production deployments, and I suggest they implement a green and blue rollback mechanism in production to avoid any delays for application teams during real deployments.
For how long have I used the solution?
As a developer, I have been using Okta Platform for around four months. As an employee doing SSO and all, it has been more than a year, so it is around one year as an employee and four to five months as a developer.
What do I think about the stability of the solution?
Okta Platform is stable, as I haven't faced any authentication issues in the year I have been using it. It works smoothly even with hundreds of applications and hasn't encountered production issues.
How are customer service and support?
The customer service and technical support for Okta Platform at the enterprise level are good, as I primarily rely on consultants who manage these interactions effectively.
Which solution did I use previously and why did I switch?
Before choosing Okta Platform, I evaluated other solutions like AWS Cognito. The main advantages of Okta Platform are its JWT option, which is passwordless, and its good integration with Vault and Terraform, while Cognito lacks such features, leading to slower session-based processes.
From the start in our application, I have been using Okta Platform and still maintain some session-based systems in the cache layer.
How was the initial setup?
I was not involved in the initial setup of Okta Platform. After the setup was completed, I have been using it for over a year, so I cannot comment on any challenges faced during the initial setup.
What about the implementation team?
I employed consultants from other organizations to assist with the deployment of Okta Platform, which has been effective.
What was our ROI?
Financially, I cannot provide specific data points for the return on investment with Okta Platform. However, technically, managing these aspects myself would incur server costs for generating JWT tokens and reliability improvements through the OAuth mechanism provided by Okta Platform reduce my technical load.
Which other solutions did I evaluate?
My company purchases Okta Platform through direct Okta, not through the AWS Marketplace. It is the Okta Platform Enterprise SaaS offering.
What other advice do I have?
My advice for companies considering Okta Platform is to make it more platform-agnostic. While Cognito is limited to AWS, Okta Platform's flexibility allows us to avoid being restricted to a single cloud provider. I would rate this review as a 9 out of 10.