cl-au logo
Story image

Okta brings centralised identity security to servers

03 Apr 2019

Identity services provider Okta has announced Okta Advanced Server Access, a new product to bring continuous, contextual access management to secure cloud infrastructure, available today.

For the first time through the Okta Identity Cloud, enterprises will be able to continuously manage and secure access to on-premises Windows and Linux servers and across leading Infrastructure-as-a-Service vendors including Amazon Web Services, Google Cloud Platform, and Microsoft Azure.

Using Okta Advanced Server Access, companies like Personal Capital and are centralising access controls in a seamless manner that better mitigates the risk of credential theft, reuse, sprawl, and abandoned administrative accounts.

Organisations are grappling with how to secure a diverse and broad set of applications and infrastructure across a disparate, extended enterprise.

Increasingly, organisations of all sizes are recognizing the need for a Zero Trust framework that limits excessive user permissions and access while requiring continuous authorisation.

However, the credentials traditionally used to access servers — Secure Shell (SSH) keys and Remote Desktop Protocol (RDP) passwords — are static, creating significant vulnerabilities across a company’s network.

Enterprises are struggling to keep track of who has the keys to access servers running mission-critical workloads and storing valuable data and are woefully limited when it comes to provisioning and deprovisioning powerful administrative accounts.

With many organisations relying on multi-cloud infrastructure, technology leaders are left with limited visibility and agility when it comes to their critical, high risk infrastructure, and no central way to control and continuously secure their hybrid environments.

“Today’s enterprises rely on cloud platforms and hybrid environments to build the products their customers rely on and engage with daily,” says Okta chief executive officer and co-founder of Todd McKinnon.

“It’s the right approach for agile innovation, but server access has traditionally relied on shared credentials that may never change, and that creates significant vulnerabilities for any large or growing organisation.

“Without a clear tie back to user identity, technology leaders lose visibility, agility, and ultimately security. Okta Advanced Server Access brings centralised identity security to organisations leveraging on-premises, hybrid, and cloud infrastructure to increase security, visibility, and control and create a better experience for the teams building products.”

Taking centralised identity and access deeper

Designed with a revolutionary Zero Trust architecture from the ground up, the Okta Identity Cloud is capable of making smart access decisions based on dynamic user attributes and device conditions, where every login is independently authenticated and authorised.

Okta Advanced Server Access gives organisations the ability to make granular access decisions about an individual login request continuously.

Access controls are backed by a one-time, short-lived credential mechanism that eliminates the common pain of tracking and protecting static keys.

Whether an organisation is securing its on-premises infrastructure, cloud infrastructure or hybrid environments, Okta Advanced Server Access serves as a critical solution to a growing enterprise security problem — all while centralising granular access control, lifecycle management, and administration through the Okta Identity Cloud.

Okta Advanced Server Access enables enterprises to:

  • Centralise access controls to servers: Using Okta Advanced Server Access, customers can automate the end-to-end lifecycle of local server user and group accounts under a single directory. It delivers seamless SSO and MFA authentication to SSH and RDP workflows, inline to the protocols, while introducing contextual access controls based on dynamic user and device posture.
     
  • Remove barriers to automation: With Okta Advanced Server Access, it is easy to automate server enrollment into the configuration management of choice, including Chef, Puppet, Ansible, and Terraform. Customers can support multi-cloud environments with a unified control plane that abstracts each provider’s IAM functions, and makes every actionable event an API, allowing for custom workflows.
     
  • Deliver a seamless end-user experience: Okta Advanced Server Access works in line with the SSH and RDP protocols, integrated natively with CLI and GUI tools. As a SaaS-delivered product, Okta Advanced Server Access abstracts the complexities of credential management, account management, and more. Automation makes it easy to configure dynamic environments, eliminating redundant tasks without compromising security
Story image
HP's new OMEN desktop PC to feature NVIDIA 30XX GPUs
What do headsets, mice, keyboards, monitors, and a desktop PC, oh my. These are all part of HP’s new line of OMEN gaming equipment range.More
Story image
Enterprise storage market knocked by COVID-19, but may bounce back
The overall APAC storage market revenue is now expected to grow at a CAGR of 5.5% during 2019-2024, compared to the previous forecast of 14.6% before the COVID-19 outbreak.More
Story image
Vectra and Exclusive Networks sign partnership to integrate NDR tech
Vectra, which leverages network detection and response (NDR) technology, will integrate into Exclusive Networks’ current EDR and SIEM offerings, reducing the chance that attackers can operate on a network and achieve what they are trying to do.More
Story image
Ericsson bolsters 5G portfolio with $1.1b Cradlepoint buyout
Ericsson will acquire Cradlepoint to create greater market share in the enterprise 5G space, boosting Ericsson’s existing 5G portfolio that includes IoT and enterprise network solutions.More
Story image
Dicker Data announces IoT portfolio expansion with dual partnership
The new distribution partnerships with Kontakt.io and Digital Matter will provide Dicker Data’s extensive partner base with access to a full range of GPS outdoor tracking and Bluetooth indoor tracking applications and devices.More
Link image
Why it's crucial to normalise proper security training for remote working
Knowing and implementing best practices for remote security can save money, time and headaches. It starts with a quality solution to safeguard the workforce.More