Okta basic assessment



Capability Maturity


Universal Directory

1/4

Leveraging Universal Directory

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s


1/4

Configuring okta Universal Directory for Attribute-Level Mastering

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s

Authentication

1/4

Authentication Management

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s


1/4

Passwordless Authentication

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s

MFA

1/4

MFA Enforcement

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s


1/4

Improvements Roadmap

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s

SSO

1/4

Extent of SSO Usage

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s


1/4

Type Of Access Control Via SSO

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s

LCM

1/4

Lifecycle Management Automation

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s


1/4

Joiner/Mover/Leaver Process

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s

Emerging Areas


Governance and OPA

Identity Theft Protection

Automation Workflows

Access Gateway & Device Access

Machine-to-Machine (M2M) Tokens

Identity Security Posture Management (ISPM)

Are you Looking
for Help?


At CyberIAM we help organisations Optimise IAM Solutions Like OKTA or other IGA/PAM Tools. Let us offer you a complementary deep-dive.

Interested? Leave your email below