SHARE
Facebook X Pinterest WhatsApp

Okta Identity Cloud: Single Sign-On Overview and Analysis

  See our complete list of Top SSO Solutions Bottom Line The Okta Identity Cloud includes single sign-on, adaptive multi-factor authentication, lifecycle management, universal directory and API access management. SSO is also available as a standalone solution. As one of the top products in the field, it finds itself in most vendor evaluation shortlists except […]

Written By
thumbnail Drew Robb
Drew Robb
Apr 24, 2019
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

 

See our complete list of Top SSO Solutions

Bottom Line

The Okta Identity Cloud includes single sign-on, adaptive multi-factor authentication, lifecycle management, universal directory and API access management. SSO is also available as a standalone solution. As one of the top products in the field, it finds itself in most vendor evaluation shortlists except for those requiring an on-premises approach.

Product Description

Single sign-on (SSO) and other features are available as standalone solutions or as part of the Okta Identity Cloud.

The Okta Identity Cloud is the identity layer for IT and software stacks. For the IT stack, the Okta Identity Cloud helps manage and secure the extended enterprise by connecting companies to thousands of pre-integrated apps and millions of devices. For the software stack, the Okta Identity Cloud makes it possible to build identity layers into apps, websites and partner portals. Okta APIs and developer tools are used to build custom or commercial apps.

Markets and Use Cases

Okta works with any company, small or large. It has industry-specific content tailored to education, energy, financial services, technology, non-profit, healthcare and government verticals.

Security Qualifications

Okta uses the SOC 2, Type I and Type II processes to audit the operational and security processes of its service and the company. Okta has also achieved the Cloud Security Alliance (CSA) Security, Trust, & Assurance Registry (STAR) Level 2 Attestation, ISO 27001:2013 Certification, and ISO 27018:2014 Certification. Additionally, Okta has an official authorized status with the Federal Risk and Authorization Management Program (FedRAMP) Moderate authority to operate (ATO), and has established a HIPAA Compliant Service instance to better serve the highly-regulated healthcare industry.

Intelligence

The Okta System Log records system events to provide an audit trail that can be used to understand platform activity and diagnose problems. The Okta System Log API provides near real-time read-only access to the system log, and it can be used by customers for integrating Okta into SIEM, CASB and UEBA solutions. For SIEM integration, customers are using Okta with Splunk, ArcSight, QRadar and others. The new ThreatInsight feature will help users make more intelligent security decisions.

Delivery

Okta is delivered as a SaaS solution.

Agents

Okta uses agents to connect to on-premises resources for provisioning and connecting to systems of record. If a customer does not have an on-prem directory to connect to, no agent is required.

Pricing

Okta offers a la carte pricing:

  • Universal Directory: $1/mo
  • Single Sign-On: $2/mo
  • Adaptive Single Sign-On: $5/mo
  • Lifecycle Management:
    • $4/mo – for 5 Okta Integration Network (OIN) apps
    • $6/mo – for 10 OIN apps
    • $7/mo – unlimited OIN apps
    • $2/mo – advanced mastering
    • $1/mo – custom integrations
    • $8/mo – unlimited OIN apps + advanced mastering + custom integrations
  • MFA: $3/mo
  • Adaptive MFA: $6/mo
  • API Access Management: $2/mo
thumbnail Drew Robb

Originally from Scotland, Drew Robb has been a writer for more than 25 years. He lives in Florida and specializes in IT, engineering, and business. As well as eWeek and TechRepublic, he writes for a wide range of magazines including Gas Turbine World, SDxCentral, and HR Magazine. He is the author of Server Disk Management in a Windows Environment (Auerbach Publications).

Recommended for you...

5 Best Free VPNs You Can Trust (And the Premium Trials Worth Trying)
Matt Gonzales
Sep 4, 2025
John the Ripper: Beginner’s Tutorial and Review
Julien Maury
Sep 3, 2025
The 6 Best Enterprise Password Managers You’ll Actually Trust
Matt Gonzales
Aug 27, 2025
5 Cloud Security Providers You Might Be Overlooking
Matt Gonzales
Aug 25, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.