Okta customers should leverage the Okta Security Trust Center to access a library of comprehensive compliance security documentation.
- Security Trust Center
A limited selection of the comprehensive compliance security documentation is publicly available, and after authenticating, enterprise Okta customers can access the entirety of the documentation library.
Contact types
The list of contact types below can be used to access the Security Trust Center. To learn more about contact types, including detailed definitions and guidance on self-service updates, reference the Resources section below.
- Primary Security Contact
- Primary IT Contact
- Primary CSM Contact
- Super Admin
- Case Admin (custom role)
- CISO/CIO Contact
New user
To log in and access our resources as a first-time user, follow these steps:
- Navigate to the Security Trust Center.
- Locate the Documents table (under Overview and Compliance) and click Get Access.
-
In the prompt, input the work email and click Continue.
NOTE: The email address should correspond to the contact types listed above
- In the prompt, populate the required fields, including First name, Last name, Work email, and Company name. To proceed, agreement to the Terms and Service, Privacy Notice is required. Then, click Submit Request.
-
Post-submission, requestors will see an acknowledgment that the request has been submitted.
-
- If the account's corresponding contact type matches the information submitted in the Request Access form, access will be automatically granted. Customers will immediately receive an email from notifications@security.okta.com with the subject line "Invitation to Access Okta's Security Trust Center" with a link to launch the Security Trust Center.
- If the account's corresponding contact type does not match the information submitted in the Request Access form, access will not be granted. For support, follow up with the account team or leverage our self-service instructions.
- Once logged in to the Okta Security Trust Center, navigate among the resources as desired.
Returning user
To log in and access our resources as a returning user who has previously completed the new user registration, follow these steps:
- Navigate to the Security Trust Center.
- Locate the Documents table (under Overview and Compliance) and click Get Access.
-
In the prompt, input the work email and click Continue
Tip: The email address should correspond to the contact types listed above
- Once logged in to the Okta Security Trust Center, navigate among the resources as desired.
Invite a Colleague
Logged-in users can extend access requests to colleagues with the same email address(es) domain with this functionality by following the steps below.
-
Navigate to the Security Trust Center and log in.
-
Hover over the profile name (top right) and click the dropdown arrow.
-
Click "Invite Colleagues,” and a dialog box will appear.
-
Enter the colleague's email address(es) and an optional message, then click Send.
NOTE: The email address domain of the colleague receiving the invitation must match that of the user creating the invite.
- The colleague will receive an email invitation from notifications@security.okta.com with a magic link to access the Security Trust Center.
Related References
- Okta Contact Definitions: a knowledge base article detailing the different customer types for accounts, and when or how they may receive communications from Okta
- Super Admins: Leverage the Okta Support Center to Review and Update the Company’s Primary Security Contact and CIO/CISO Contact: a knowledge base article that guides Okta customers through making self-service contact information updates
- Empowering Security with Customer Trust Solutions: a blog article taking a closer look at the tools and solutions that power our Customer Trust efforts.
- Assigning the Case Admin Permission to Okta Admins: a knowledge base article detailing how to assign the Case Admin permission custom role.
