{"id":97479,"date":"2025-04-26T10:50:02","date_gmt":"2025-04-26T05:20:02","guid":{"rendered":"https:\/\/cloudfoundation.com\/blog\/?p=97479"},"modified":"2025-05-02T12:43:06","modified_gmt":"2025-05-02T07:13:06","slug":"okta-authentication-and-policies","status":"publish","type":"post","link":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/","title":{"rendered":"Okta Authentication and Policies"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Understanding_Okta_Authenticators\" >Understanding Okta Authenticators<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Oktas_Recommendations_for_Authenticators\" >Okta&#8217;s Recommendations for Authenticators<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Getting_Started_with_Okta_Verify\" >Getting Started with Okta Verify<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Understanding_Okta_Configurations\" >Understanding Okta Configurations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Okta_Authentication_and_Recovery_Settings\" >Okta Authentication and Recovery Settings<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Configuring_Okta_Enrollment_Policies\" >Configuring Okta Enrollment Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Customising_Rules_in_Okta_Policies\" >Customising Rules in Okta Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Navigating_Okta_Applications\" >Navigating Okta Applications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Understanding_Okta_Policies\" >Understanding Okta Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Enhancing_Security_with_Okta_Authentication\" >Enhancing Security with Okta Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Okta_Device_Management_and_Policies\" >Okta Device Management and Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Leveraging_Okta_for_Platform-Specific_Policies\" >Leveraging Okta for Platform-Specific Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Understanding_Okta_and_Device_Policies\" >Understanding Okta and Device Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Oktas_Role_in_Enhancing_Security\" >Okta&#8217;s Role in Enhancing Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Why_Okta_Is_Essential_for_Access_Management\" >Why Okta Is Essential for Access Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Managing_Office_Networks_with_Okta\" >Managing Office Networks with Okta<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Utilizing_IP_Zones_in_Okta\" >Utilizing IP Zones in Okta<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Customizing_Authentication_Policies_with_Okta\" >Customizing Authentication Policies with Okta<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Blocking_High-Risk_Regions_with_Okta\" >Blocking High-Risk Regions with Okta<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Preventing_Proxy-Based_Threats_Using_Okta\" >Preventing Proxy-Based Threats Using Okta<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Understanding_Oktas_Role_in_Secure_Access\" >Understanding Okta&#8217;s Role in Secure Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#How_Okta_Protects_Your_Devices\" >How Okta Protects Your Devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Okta_and_Illegal_Activities_Prevention\" >Okta and Illegal Activities Prevention<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Why_Oktas_Connection_Process_Matters\" >Why Okta&#8217;s Connection Process Matters<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Randomized_Addresses_with_Okta\" >Randomized Addresses with Okta<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Using_Okta_for_Secure_Marketplaces\" >Using Okta for Secure Marketplaces<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Oktas_Customizable_Proxy_Settings\" >Okta&#8217;s Customizable Proxy Settings<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Okta_Behavior_Detection\" >Okta Behavior Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Okta_Velocity_Detection\" >Okta Velocity Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Okta_Authentication_Policies\" >Okta Authentication Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Configuring_Okta_for_Travel_Behavior\" >Configuring Okta for Travel Behavior<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#Okta_and_User_Context\" >Okta and User Context<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Okta_Authenticators\"><\/span><strong>Understanding Okta Authenticators<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta authenticators are your primary security tools. In the past, these might have been known as multi-factors; now with Okta they&#8217;re called authenticators &#8211; these determine how identity can be confirmed &#8211; such as email, password and \u00a0<a href=\"https:\/\/cloudfoundation.com\/blog\/cloud-security-interview-questions-answers\" target=\"_blank\" rel=\"noopener\"><strong>security<\/strong><\/a> questions are some examples.<\/p>\n<p>Okta takes security seriously, providing an extensive list of supported authenticators organised according to factor type and method. These authenticators include possession, knowledge, biometric, or combinations thereof such as email being owned versus password being known. Security questions also rely heavily on knowledge.<\/p>\n<p>Possession and biometric factors often combine to form the strongest factor. Knowledge factors, like passwords or security questions, can easily be stolen or compromised; by contrast, possession plus biometric adds extra security layers; for instance Okta Verify provides biometric-enabled authentication capabilitieswith hardware protection features, device binding functionality, user presence support, etc.<\/p>\n<p>To satisfy stringent security requirements efficiently you&#8217;ll require both Okta Verify as an authenticator as well as your biometric signature to meet them; doing this significantly reduces compromise risks considerably and makes compromise risks significantly smaller!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Oktas_Recommendations_for_Authenticators\"><\/span><strong>Okta&#8217;s Recommendations for Authenticators<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Custom authenticators such as OTPPS should generally be avoided to minimize risks to security. Google Authenticator, while functional, is generally disapproved of by Okta; therefore I advise opting for Okta Verify or security keys like Yubikey which provide strong device-binding authentication solutions instead.<\/p>\n<p>Okta Verify stands out among your options as being most reliable; using it will let you benefit from its advanced security features like device protection and biometric reliability. YubiKey may be suitable if device-bound security meets your requirements; nonetheless it&#8217;s wiser to avoid weaker authenticators which might compromise your <a href=\"https:\/\/cloudfoundation.com\/blog\/sap-security-certification\"><strong>security infrastructure<\/strong><\/a>.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Security-Tools-1.png\" alt=\"\" width=\"800\" height=\"2424\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Getting_Started_with_Okta_Verify\"><\/span><strong>Getting Started with Okta Verify<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#8217;s dive right in with Okta Verify setup: you likely already use its app on your phone to receive push notifications; did you know there&#8217;s also a desktop version? Windows users can access Okta Verify MSI\/EXE versions in settings and downloads; Mac users should search their Mac App Store. And finally if running a <a href=\"https:\/\/cloudfoundation.com\/blog\/filenet-training\" target=\"_blank\" rel=\"noopener\"><strong>small organization this file could<\/strong><\/a><strong>\u00a0<\/strong>even be shared via Google Drive for easy installation!<\/p>\n<p>At its core, Okta Verify ensures an effortless authentication experience across\u00a0devices by directly installing software onto them with deployment tools that install software directly onto users&#8217; computers or phones. Individual users may download Okta Verify from the App Store as an individual user to register devices like their laptop and phone under their account for seamless and secure authentication across devices.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Okta_Configurations\"><\/span><strong>Understanding Okta Configurations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As soon as you implement Okta for the first time, it&#8217;s essential that all changes are communicated effectively to your team and stakeholders. Doing this ensures everyone knows why updates have occurred while eliminating unnecessary concerns about future implementation &#8211; for instance when configuring Okta Verify push notifications ensure all steps have been completed for a seamless deployment experience.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Configuration-Basics.png\" alt=\"\" width=\"800\" height=\"1070\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Okta_Authentication_and_Recovery_Settings\"><\/span><strong>Okta Authentication and Recovery Settings<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta allows you to clearly differentiate authentication and recovery methods; email and security questions should only be used as recovery measures; \u00a0passwords remain mandatory as authenticationmeasures and Okta allows customisable password policies so they align with your organisation&#8217;s security standards.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Configuring_Okta_Enrollment_Policies\"><\/span><strong>Configuring Okta Enrollment Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Enrollment policies in<strong>\u00a0<\/strong>Okta are key for managing authenticator setup. The default policy can be edited or replaced with custom ones &#8211; for instance requiring Okta Verify password authentication while turning off email authentication and security questions as authentication measures &#8211; tailor these policies specifically to groups within your organisation.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Customising_Rules_in_Okta_Policies\"><\/span><strong>Customising Rules in Okta Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta makes it simple and effective for businesses to add personalized policies with Okta&#8217;s powerful Rules Engine, providing flexible controls over when and to whom these rules should apply &#8211; for instance if a user does not possess authenticators which meet requirements during sign-in, Okta prompts enrollment during their next sign-in, \u00a0ensuring security measures are enforced effectively.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Navigating_Okta_Applications\"><\/span><strong>Navigating Okta Applications<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta has organised its applications into three distinct groups, the admin console, browser plugin and user dashboard. Each application requires individual attention with specific configuration settings &#8211; knowing this enables efficient administration of these services.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Okta_Policies\"><\/span><strong>Understanding Okta Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta makes policy management effortless by making authentication and sign-on policies easily visible across applications. Imagine having 20 applications where it is imperative that everyone follows one uniform policy&#8211;Okta simplifies this process: simply go into its Policy Section, add all applicable apps, and ensure everyone abides by a consistent set of regulations.<\/p>\n<p><video src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Policy-Customisation.webm\" poster=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/plugins\/a3-lazy-load\/assets\/images\/lazy_placeholder.gif\" autoplay=\"autoplay\" loop=\"loop\" muted=\"\" width=\"800\" height=\"auto\"><\/video><\/p>\n<p>Take for instance the Okta dashboard: it showcases various policies and their rules; but be mindful that catch-all rules cannot be edited except for limited details. With Okta you can tailor policies specifically to your needs by specifying user type, device state, platform platform IP or risk level to create robust yet flexible policies.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Enhancing_Security_with_Okta_Authentication\"><\/span><strong>Enhancing Security with Okta Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta offers numerous authentication solutions, from password authentication with hardware protection and antiphishing measures, to biometric verification with Yubikeys or biometrics that need to be preconfigured before use. Users can securely verify themselves using Okta Verify or biometrics with features like Okta FastPass; users can even set password reauthentication frequencies every two hours for added consistency in security.<\/p>\n<p>Okta may pose additional security questions during sign-in that are optional but beneficial, and once signed in users can view device details (for instance Android device models) through Okta&#8217;s management dashboard &#8211; something which has proven invaluable for organisations implementing Mobile Device <strong>\u00a0<\/strong>Management (MDM).<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Okta_Device_Management_and_Policies\"><\/span><strong>Okta Device Management and Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta Verify forms the cornerstone of device management by installing it across devices and enrolling users. Managed devices appear compliant with organisational policies, giving administrators power to enforce access rules; for instance if an unmanaged device tries to gain entry, Okta can block access ensuring company data only remains on approved devices.<\/p>\n<p>Okta seamlessly integrates with MDM providers like Jamf for macOS and Windows machines. Administrators can leverage policies to enforce login restrictions to only devices where Okta Verify has been installed and recognised as being managed, increasing both security and complying with company standards. This approach ensures compliance while elevating overall company compliance standards.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#0095f2&#8243; background_color_gradient_end=&#8221;#7dbed8&#8243; background_color_gradient_direction=&#8221;92deg&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;73%|62%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; link_option_url_new_window=&#8221;on&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/SS_436-_Converted_-1.png&#8221; url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;114%|112%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;25px|-4px&#8221; transform_translate_linked=&#8221;off&#8221; width=&#8221;98.1%&#8221; custom_margin=&#8221;|7px|||false|false&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;21px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; link_option_url_new_window=&#8221;on&#8221;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Okta Training<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Explore Course Content&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Leveraging_Okta_for_Platform-Specific_Policies\"><\/span><strong>Leveraging Okta for Platform-Specific Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta&#8217;s flexibility extends beyond device access control to platform-specific policies as well. Administrators using macos 12 can enforce device assurance policies to allow only devices compliant with this OS to log in &#8211; making Okta an indispensable solution for keeping track of device access in shifting IT environments.<\/p>\n<p>Okta provides enterprises with the granular control necessary for modern enterprises that wish to rollout macos updates, like version 13, by making sure only updated devices gain entry. With such comprehensive and specific control available through Okta, businesses of today depend on it as essential software.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Okta_and_Device_Policies\"><\/span><strong>Understanding Okta and Device Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me demonstrate how <a href=\"https:\/\/cloudfoundation.com\/blog\/okta-training\"><strong>Okta can provide security<\/strong><\/a> when everyone uses Mac OS 13. Using Okta, you can set a policy which only permits access if an operating system meets this version, meaning anyone using an earlier one is denied entry automatically.<\/p>\n<p>Okta excels at protecting against potential attackers with valid credentials despite them having them; even if someone enters their username and password correctly, their device must run Mac OS 13 before proceeding further.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Security-Enhancements.png\" alt=\"\" width=\"800\" height=\"2714\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Oktas_Role_in_Enhancing_Security\"><\/span><strong>Okta&#8217;s Role in Enhancing Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta has enabled us to implement stringent security measures while keeping end-user experience uncluttered and seamless. Policies based on operating systems help minimize potential vulnerability from outdated devices.<\/p>\n<p>Okta makes an exceptional contribution by helping administrators set clear rules, guaranteeing only compliant devices gain entry. This adds another level of protection when managing user authentication and <a href=\"https:\/\/cloudfoundation.com\/blog\/tivoli-access-manager-tutorial\" target=\"_blank\" rel=\"noopener\"><strong>access management<\/strong><\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_Okta_Is_Essential_for_Access_Management\"><\/span><strong>Why Okta Is Essential for Access Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta has proven invaluable as part of my security system&#8217;s defenses, making enforcement policies such as restricting user access with outdated OS versions much harder for attackers to exploit vulnerable systems.<\/p>\n<p>Okta&#8217;s focus on compliance and security provides organisations with an efficient means of maintaining control over who can access their resources, protecting against unauthorised access. Every policy implemented with Okta strengthens your defenses against unwanted access.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Device-Security.png\" alt=\"\" width=\"800\" height=\"945\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Managing_Office_Networks_with_Okta\"><\/span><strong>Managing Office Networks with Okta<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As soon as it comes to protecting office networks, one of the first tasks should be identifying gateway IPs. Consult your network team and take down these details; for instance if given 191.680.0\/14 as your range then that includes IP addresses from 191.660.1-191.660.254. This basic structure forms part of Okta&#8217;s seamless implementation.<\/p>\n<p>Okta allows you to easily define trusted IP ranges, making it simpler and faster for you to ensure that no office network IPs are flagged as malicious. For instance, when using proxy solutions like ZScaler or Netskope with Okta you simply input their ranges, specifying both start and end points so these IPs remain recognized within your network as safe.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Utilizing_IP_Zones_in_Okta\"><\/span><strong>Utilizing IP Zones in Okta<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta provides block IP zones to prevent certain addresses from accessing your systems, simply by inputting these IPs into its interface and automatically blocking them. Dynamic zones also add another level of security; for instance if your organization operates within the US you could configure Okta to restrict access from certain countries like Russia and Iran based on specific criteria &#8211; providing additional layers of protection!<\/p>\n<p>By default, Okta disallows Russian IPs unless special permissions have been granted; this ensures compliance with international regulations while protecting against potential threats to your system. Okta&#8217;s robust policies enable organizations to block IP addresses that pose risk while strengthening <strong>\u00a0<\/strong>security across their organization.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Customizing_Authentication_Policies_with_Okta\"><\/span><strong>Customizing Authentication Policies with Okta<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta provides organizations with the flexibility to tailor authentication policies according to their unique requirements, for instance enabling only password authentication within office networks &#8211; without multi-factor authentication (MFA). This facilitates smoother internal processes without jeopardizing security.<\/p>\n<p>Okta&#8217;s session policies make implementing global session rules simple and effective. Once your network settings have been configured in Okta, they can easily be integrated across authentication policies &#8211; making Okta an invaluable addition to any existing framework.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Blocking_High-Risk_Regions_with_Okta\"><\/span><strong>Blocking High-Risk Regions with Okta<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Imagine that your employees travel to high-risk regions where <a href=\"https:\/\/cloudfoundation.com\/blog\/cyberark-training\" target=\"_blank\" rel=\"noopener\"><strong>cybersecurity<\/strong><\/a> threats are abundant. Okta can help secure access to your network from these areas by restricting IPs directly through its platform &#8211; this ensures even if credentials become compromised, unapproved entry won&#8217;t happen!<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Network-Management.png\" alt=\"\" width=\"800\" height=\"2990\" \/><\/p>\n<p>Okta can also protect employees against coercing them into divulging login details by blocking certain regions and enacting stringent access policies, \u00a0helping reduce security branches.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Preventing_Proxy-Based_Threats_Using_Okta\"><\/span><strong>Preventing Proxy-Based Threats Using Okta<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Proxy tools such as Tor are commonly utilized by hackers to conceal their activities; with Okta you can identify and block these proxies to ensure network security remains strong. Hackers frequently rely on proxy tools like Tor to operate unseen; with Okta you stay one step ahead!<\/p>\n<p>Okta&#8217;s proactive approach to recognizing and mitigating risks from unconventional sources demonstrates its comprehensive security offerings. From Tor proxies and unfamiliar IP ranges to Tor botnets and Tor relay services, Okta provides all of the tools<strong>\u00a0<\/strong>you need for effective handling.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Oktas_Role_in_Secure_Access\"><\/span><strong>Understanding Okta&#8217;s Role in Secure Access<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta has become an indispensable solution in terms of managing secure access across devices and platforms, safeguarding user <a href=\"https:\/\/cloudfoundation.com\/blog\/data-architect-interview-questions\"><strong>data<\/strong><\/a><strong>\u00a0<\/strong>in the process. By choosing Okta as part of your,<strong>\u00a0<\/strong>data protection plan . I hope I have demonstrated its efficacy at managing access.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Okta_Protects_Your_Devices\"><\/span><strong>How Okta Protects Your Devices<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta can help protect company devices against potential security risks, while giving employees\u00a0flexibility in exploring its features on personal devices. Let me demonstrate why restricting access on company devices is crucial: Okta ensures sensitive information stays protected while giving people freedom to explore features at will.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#ff8c7c&#8221; background_color_gradient_end=&#8221;#e5ba4e&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top left&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;74%|69%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||-5px||false|false&#8221; custom_padding=&#8221;|||2px|false|false&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; link_option_url_new_window=&#8221;on&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/8423118_3895895.png&#8221; url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width=&#8221;85.4%&#8221; custom_margin=&#8221;-31px||-24px||false|false&#8221; custom_padding=&#8221;|22px|0px||false|false&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;19px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;1.2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/&#8221; link_option_url_new_window=&#8221;on&#8221;]<\/p>\n<h1 style=\"text-align: center;\"><strong>Okta Online <\/strong>Training<\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Up Coming Batches&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#E09900&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221; background_layout=&#8221;dark&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Okta_and_Illegal_Activities_Prevention\"><\/span><strong>Okta and Illegal Activities Prevention<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With Okta in place, your systems can stay safe from illegal activities typically associated with unprotected platforms. I&#8217;ve heard accounts of platforms being misused for harmful reasons &#8211; that&#8217;s why having something like Okta makes a significant difference!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_Oktas_Connection_Process_Matters\"><\/span><strong>Why Okta&#8217;s Connection Process Matters<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Connecting to Okta is straightforward and secure. While initial set up might feel lengthy, every action taken by you is encrypted using our solutions and this makes us reliable solutions that make their job easy!Okta&#8217;s P2P Network: A Secure Choice<\/p>\n<p>Okta operates on a P2P network, meaning your traffic gets routed securely and is never exposed. This innovative feature ensures no one can pinpoint your true location, significantly increasing privacy. Even though Okta may seem slower at first, its protection more than makes up for any delays experienced while using their service.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Device-Protection.png\" alt=\"\" width=\"800\" height=\"1066\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Randomized_Addresses_with_Okta\"><\/span><strong>Randomized Addresses with Okta<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One of Okta&#8217;s signature features is its use of random addresses &#8211; each time you sign in appears from an entirely different location! This highlights their dedication to protecting user anonymity.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Using_Okta_for_Secure_Marketplaces\"><\/span><strong>Using Okta for Secure Marketplaces<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta makes online marketplace shopping safer. Unprotected access has exposed me to several risks; by adding Okta security measures you are creating an additional safeguard which ensures smooth transactions.<\/p>\n<p><video src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Privacy-Enhancements.webm\" poster=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/plugins\/a3-lazy-load\/assets\/images\/lazy_placeholder.gif\" autoplay=\"autoplay\" loop=\"loop\" muted=\"\" width=\"800\" height=\"auto\"><\/video><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Oktas_Customizable_Proxy_Settings\"><\/span><strong>Okta&#8217;s Customizable Proxy Settings<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta allows you to personalize the proxy settings according to your specific requirements, from blocking certain configurations or configurations altogether &#8211; giving it maximum flexibility. I always take care to utilize these features for maximum protection.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Okta_Behavior_Detection\"><\/span><strong>Okta Behavior Detection<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me illustrate how Okta&#8217;s behavior detection directly impacts user authentication. Imagine you have authenticated from only US locations for 20 authentications in a row, then on 21st login from Canada Okta sends out an email asking whether this really is you? &#8211; <strong>\u00a0<\/strong>providing user security through change detection systems such as Okta that evaluate location changes and require verifications.<\/p>\n<p>Okta&#8217;s verification process takes into account not just countries but cities as well, for example if your last 10 authentications took place in New York and your next one takes place in Washington &#8211; triggering an identical verification process each time! Our system adapts seamlessly to changes in city, country, device geolocation IP address or state so each factor is taken into consideration and taken into account.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Okta_Velocity_Detection\"><\/span><strong>Okta Velocity Detection<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta makes travel simpler with velocity detection capabilities that work on planes or trains &#8211; when <a href=\"https:\/\/cloudfoundation.com\/blog\/what-is-sap-abap\"><strong>used for authentication<\/strong><\/a> on these modes of travel, Okta allows travelers to customize how it recognizes speed changes as their location changes quickly; perfect for onboard train travel when constantly shifting locations can compromise authentication security.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Security-Enhancements-1.png\" alt=\"\" width=\"800\" height=\"2086\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Okta_Authentication_Policies\"><\/span><strong>Okta Authentication Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta makes travel simpler with velocity detection capabilities that work on planes or trains &#8211; when used for authentication on these modes of travel, Okta allows travelers to customize how it recognizes speed changes as their location changes quickly; perfect for onboard train travel when constantly shifting locations can compromise authentication security.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Configuring_Okta_for_Travel_Behavior\"><\/span><strong>Configuring Okta for Travel Behavior<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta allows you to tailor session policies based on user behavior. If users are traveling between cities or countries, session length could be reduced for added security while stationary users might benefit from extended session times for convenience.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/Okta-Enhancements.png\" alt=\"\" width=\"800\" height=\"874\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Okta_and_User_Context\"><\/span><strong>Okta and User Context<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Okta excels at understanding real user contexts. No matter whether someone is working from their office desk, traveling by train, switching devices frequently or accessing multiple accounts concurrently; Okta&#8217;s session policies adapt seamlessly so every user&#8217;s unique situation is taken into consideration, providing security as well as flexibility for every situation that arises.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#494fff&#8221; background_color_gradient_end=&#8221;#9ea6ff&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top left&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;74%|71%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; link_option_url_new_window=&#8221;on&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/Untitled-11.png&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;103%|103%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;11px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;|88px||||&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;19px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;1.2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; link_option_url_new_window=&#8221;on&#8221;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Okta Course Price<\/strong><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Offer Price&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; url=&#8221;https:\/\/cloudfoundation.com\/blog\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_team_member name=&#8221;Navya Chandrika&#8221; position=&#8221;Author&#8221; image_url=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/02\/Navya-Chandrika-e1739945975688.png&#8221; _builder_version=&#8221;4.9.7&#8243; header_level=&#8221;h5&#8243; header_font=&#8221;Titillium Web|700|||||||&#8221; body_font=&#8221;Titillium Web||||||||&#8221; body_font_size=&#8221;16&#8243;]Every second is a new opportunity to shape your future with the choices you make now.[\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;] Understanding Okta Authenticators Okta authenticators are [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":97506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[231],"tags":[],"class_list":{"0":"post-97479","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-okta"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Okta Authentication and Policies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Okta Authentication and Policies\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;] Understanding Okta Authenticators Okta authenticators are [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudFoundation | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-26T05:20:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-02T07:13:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/person-holding-tablet-technology-looking-graph-pollution-reduction-contaminants-toxic-substances-industrial-plants-obtain-environmental-certificatex9-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NAGENDRAG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAGENDRAG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Okta Authentication and Policies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/","og_locale":"en_US","og_type":"article","og_title":"Okta Authentication and Policies","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;] Understanding Okta Authenticators Okta authenticators are [&hellip;]","og_url":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/","og_site_name":"CloudFoundation | Blog","article_published_time":"2025-04-26T05:20:02+00:00","article_modified_time":"2025-05-02T07:13:06+00:00","og_image":[{"width":500,"height":500,"url":"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/person-holding-tablet-technology-looking-graph-pollution-reduction-contaminants-toxic-substances-industrial-plants-obtain-environmental-certificatex9-1.jpg","type":"image\/jpeg"}],"author":"NAGENDRAG","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NAGENDRAG","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/","url":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/","name":"Okta Authentication and Policies","isPartOf":{"@id":"https:\/\/cloudfoundation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#primaryimage"},"image":{"@id":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/person-holding-tablet-technology-looking-graph-pollution-reduction-contaminants-toxic-substances-industrial-plants-obtain-environmental-certificatex9-1.jpg","datePublished":"2025-04-26T05:20:02+00:00","dateModified":"2025-05-02T07:13:06+00:00","author":{"@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4"},"breadcrumb":{"@id":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#primaryimage","url":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/person-holding-tablet-technology-looking-graph-pollution-reduction-contaminants-toxic-substances-industrial-plants-obtain-environmental-certificatex9-1.jpg","contentUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2025\/04\/person-holding-tablet-technology-looking-graph-pollution-reduction-contaminants-toxic-substances-industrial-plants-obtain-environmental-certificatex9-1.jpg","width":500,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/cloudfoundation.com\/blog\/okta-authentication-and-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudfoundation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Okta Authentication and Policies"}]},{"@type":"WebSite","@id":"https:\/\/cloudfoundation.com\/blog\/#website","url":"https:\/\/cloudfoundation.com\/blog\/","name":"CloudFoundation | Blog","description":"A New way of Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudfoundation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4","name":"NAGENDRAG","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","caption":"NAGENDRAG"},"url":"https:\/\/cloudfoundation.com\/blog\/author\/nagendrag\/"}]}},"_links":{"self":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/97479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/comments?post=97479"}],"version-history":[{"count":11,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/97479\/revisions"}],"predecessor-version":[{"id":98609,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/97479\/revisions\/98609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media\/97506"}],"wp:attachment":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media?parent=97479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/categories?post=97479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/tags?post=97479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}