<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Frequently Asked Questions on Identity Threat Protection with Okta AI
Identity Threat Protection
Okta Classic Engine
Okta Identity Engine

Table of Contents

Foundational Questions

What is Identity Threat Protection?
What specific problems or challenges is Okta solving for customers?
How do Okta customers solve these problems today?
What key capabilities and benefits are we offering? 
What are the main use cases? 
What is our unique differentiation?
Is Identity Threat Protection a good fit for my organization?
What applications will be supported for Universal Logout?
Why is it called Universal Logout if only certain apps are supported? 
When is support coming for Universal Logout for Office 365? 

Technical and Architecture Questions

How does continuous risk assessment in ITP enhance app access security in Okta?
What are Login, Session, and Entity Risk? 
What is SSF? 
How are shared signals used by Okta? 
Who are our current signal-sharing partners? 
What are the differences between Okta Verify device signals and Shared Signals Framework? ​​​​​​​
Is Microsoft leveraged as part of the Shared Signals integration?  ​​​​​​​
What is CAEP?  ​​​​​​​
How do we distinguish between threat actors using the same IP address?  ​​​​​​​
​​​​​​​How Does Okta Handle IP-Chain (X-Forwarded-For) Changes (for example in proxy/Zscaler environments? ​​​​​​​


Foundational Questions

What is Identity Threat Protection? 

Identity Threat Protection with Okta AI (ITP) is a new Workforce Identity Cloud (WIC) product that provides continuous evaluation of user risk and authentication policies throughout active sessions to detect identity-based threats such as session hijacking attempts and compromised accounts. Powered by machine learning and broad signal ingestion from an organization’s best-in-breed security stack, it extends observability beyond initial authentication to any time after a user is logged in. This enables real-time detection, and inline response to attacks at the identity layer.
 

What specific problems or challenges is Okta solving for customers?

  • Gaps in continuous risk monitoring after initial authentication. Okta continuously evaluates risk signals throughout user sessions, providing real-time assessment and enabling timely response to dynamic risk changes post-authentication. This comprehensive approach to risk management supports Zero Trust initiatives.

  • Fragmented risk insights across diverse security tools and systems. As a universally deployed Identity Provider with control over the authentication session, Okta performs comprehensive, continuous risk assessments by leveraging signals from the customer’s broader tech stack to strengthen protection against identity threats.

  • Balancing risk mitigation with the user experience. By evaluating a variety of security indicators – like unusual login patterns and behavior anomalies –from across an organization’s tech stack, Okta allows organizations to tailor risk mitigation to specific threat levels. This optimizes both security and user experience through flexible authentication flows that protect against sophisticated threats, while ensuring a seamless user journey.

  • Decentralized and highly manual threat detection response. Okta empowers organizations to leverage risk events to rapidly initiate automated workflows that remediate threats in real-time. This simplifies identity threat detection and response compared to over-reliance on manual processes that slow reaction times.

 

How do Okta customers solve these problems today?

Current workarounds include:

  • Ineffective continuous risk monitoring. Rely solely on initial authentication, leaving sessions unmonitored post-authentication with no capabilities for detecting changes in risk or user context

  • Disconnected security tools. Use siloed security tools lacking integration, resulting in fragmented visibility and inability to correlate signals across systems.

  • Disruptive risk mitigation. Shortened session lifetimes and repeated MFA prompts for any risky activity imposes excessive friction on users, especially low-risk scenarios.

  • Manual and reactive threat response. Vendor lock-in, siloed security, and reliance on manual processes for threat response delay remediation after the fact, increasing risk exposure.

What key capabilities and benefits are we offering?

Capability

Description

Benefit(s) / Why it matters

Continuous Context

 Evaluation

Uses AI and machine-learning to continuously evaluate risk and user context throughout the session—not just at login



  • Monitors changes in user behavior, device health, and network activity during active sessions

Shared Signals Ecosystem




Seamless integration with a wide range of security tools including XDR (Extended Detection and Response), CASB (Cloud Access Security Broker), UEM (Unified Endpoint Management), and more across platforms. All via the standards-based Continuous Access Evaluation Protocol (CAEP) and the Shared Signals Framework (SSF).

  • Unifies threat visibility across multiple security platforms

  • Enables real-time risk signal sharing between Okta and partner technologies for faster detection and response (CAEP, SSF)

  • Strengthens overall security posture through multi-source threat intelligence



Dynamic Policy Evaluation

Continuously reassesses authentication and session policies based on real-time risk signals and context changes.

  • Adapts security posture dynamically as conditions change

  • Ensures consistent policy enforcement across the user journey

  • Enables immediate response to emerging threats or suspicious activities

Precision Risk Response





Triggers automated responses in real-time—like step-up MFA, session termination, or other remediation actions through Okta Workflows.

  • Balances robust security with minimal user disruption

  • Enhanced detection of sophisticated, multi-vector attacks





Identity Threat Analytics



Delivers comprehensive visibility into user risk levels, policy violations, and security events through detailed dashboards and reports 

  • Strengthens threat detection and response capabilities through proactive risk management.

  • Gives security teams the tools they need to analyze, prioritize, and act upon threat data in a timely manner



Feedback Pipeline

Allows admins to provide feedback on risk detections, improving the accuracy of AI/ML models over time.

  • Enables continuous improvement of the threat detection system

  • Helps reduce false positives and optimize security policies

Universal Logout




Allows admins to terminate in one action all active Okta, web, and native app sessions across a user's devices, including both mobile and desktop platforms, for a fixed set of Okta-supported applications that have the feature enabled.

This can occur either manually or automatically as a result of configured policy triggering based on defined risk criteria.

  • Boosts security and delivers a consistent experience by logging users out of Okta supported applications with the feature enabled

  • Ensures that if a bad actor has hijacked a user’s session, the user is logged out of all supported applications with the feature enabled.

Use cases: 

  • Employee termination - Immediately revoke access for laid off, HR-related, legal, etc. situations

  • High user risk detection - Revoke sessions based on continuous access evaluation policies or user risk thresholds

  • Lost/stolen device - Terminate sessions on compromised devices and optionally lock device

  • Insider threat - Revoke access for suspicious user activity 

  • Credential compromise - Remove access when user credentials are stolen

  • User investigation - Suspend user under review and terminate active sessions

 

 

What are the main use cases?

Unified Threat Insights & Ecosystem Collaboration

  • Enabling Features: Continuous Context Evaluation, Shared Signals Ecosystem, Identity Threat Analytics 

  • Description: Incorporate, analyze, and act upon threat signals from an organization’s varied threat detection and security solutions, while fostering collaboration with the broader security ecosystem. This integrative approach enhances threat detection, provides actionable insights, and strengthens the organization's security posture.

  • Customer Benefit: Comprehensive visibility combined with ecosystem collaboration leads to quicker threat detection which enables faster response.


Continuous Risk Assessment 

  • Enabling Features: Continuous Context Evaluation, Dynamic Policy Evaluation 

  • Description: Continuously assess and adjust session security based on evolving risk factors and changes in user context. By monitoring for anomalies during active sessions, potential session hijacking or cookie theft attempts are detected and mitigated.

  • Customer Benefit: Reduces the risk of unauthorized access during ongoing sessions, ensuring data integrity and user trust.


Adaptive User Authentication

  • Enabling Features: Dynamic Policy Evaluation, Precision Risk Response 

  • Description: Dynamically adjust authentication requirements based on user behavior and context. As risks evolve, the system prompts users for additional authentication measures, providing the right balance between security and user experience.

  • Customer Benefit: Enhanced security without compromising user experience, leading to higher user satisfaction and productivity.


Proactive Threat Remediation

  • Enabling Features: Precision Risk Response 

  • Description: Automatically trigger specific responses to emerging identity threats. This can include instant logouts, prompting users for multi-factor authentication, or other tailored actions.

  • Customer Benefit: Rapid and effective response to threats, minimizing potential damage and ensuring business continuity.


Insider Threat Management

  • Enabling Features: Continuous Context Evaluation, Precision Risk Response, Identity Threat Analytics 

  • Description: Monitor, detect, and respond to anomalous behaviors that may indicate malicious or unintentional insider threats.

  • Customer Benefit: Protect critical assets from potential threats originating from within the organization, maintaining trust and data security.  

What is our unique differentiation?

Unified Threat Intelligence: Seamlessly integrates with your entire tech stack, providing a comprehensive view of identity threats, and offering swift detection and remediation.

Continuous Risk Evaluation: Leveraging real-time signals from diverse security tools and SaaS applications, Okta  continuously reassesses changes in user risk or context, heightening protection at every user touchpoint.

Unparalleled Threat Mitigation Speed: Okta can instantly revoke credentials, enforce step-up authentication, or trigger sophisticated remediation workflows (for 90+ actions across 30+ apps), without the delays typically associated with cross-platform integrations. This real-time response capability directly results from our unique position as the identity backbone for organizations.

 

Is Identity Threat Protection a good fit for my organization? 

ITP may be a great fit for you if:

ITP may not be a great fit for you at this time if:  

You are a current Okta customer who has invested in Adaptive Multi-Factor Authentication (AMFA), FastPass, Okta Verify and is looking to further fortify your identity security posture.

You deploy a mix of SaaS applications and value a defense-in-depth approach with a best-in-class security ecosystem (e.g., CrowdStrike, Palo Alto Networks).

You are exploring Identity Threat Detection and Response (ITDR) capabilities specifically tuned for Okta.

Your organization uses Okta as your primary Identity Provider and has migrated to the Okta Identity Engine (OIE).

You are an Okta Workforce Identity customer. 

Your organization is early in its security maturity journey and has not yet fully implemented Adaptive Multi-Factor Authentication (AMFA) or does not plan to do so in the future.

You are not planning to migrate to the Okta Identity Engine (OIE) in the near future.

Your organization exclusively uses Okta Customer Identity and/or Auth0. 

You require specific compliance certifications, such as HIPAA, FedRAMP High, or DOD IL4, which are not yet available for Identity Threat Protection. Check the status here.

 

What applications will be supported for Universal Logout?  

The following native Okta applications are supported for Universal Logout. 

Access Gateway

Admin Console

End-User Dashboard

End-User Settings

Okta Browser Plugin: The app list appears in the plugin when Universal Logout is triggered for this app. Users must, however, reauthenticate if they want to access these apps.

Auth0 applications

The following third-party applications are supported for Universal Logout.. 

Box

Cerby

Dropbox for Business

Google Workspace and Google Cloud Platform

Microsoft Office 365 (partial*) 

PagerDuty

Salesforce

Slack

Splunk

Surf

Zendesk

Zoom 

 

Additional apps are being tested. This list will continue to grow and is prioritized based on those providing API support to enable direct inline policy-based logout/session revocation from all devices. Other apps will leverage custom workflows as a bridge until we can expand API support.  Our goal is to incrementally expand Universal Logout support over time through closer API-level integration with Independent Software Vendors (ISVs).


* For certain apps, (such as Microsoft Office 365) "partial logout" refers to the limitation where some Office 365 sessions remain active until access tokens expire, despite logout being initiated. Universal Logout can revoke refresh tokens but not these active access tokens. We're working with Microsoft to address this and achieve a more comprehensive logout solution. This distinction will be called out in the product as well in the tech docs. 

What is the difference between “Single Logout” and “Universal Logout”? 

Single Logout is a user-initiated flow that allows a user to log out from all services in a federated identity system at once. Okta does not support this in full; rather, it allows the Service Provider to initiate a logout at the IDP layer (Okta), not at all other Service Providers. Single Logout is usually managed by browser redirects and has historically been pretty unreliable.

 

Universal Logout, on the other hand, is an admin/system-initiated flow that uses app-specific APIs to directly terminate application sessions for a specified user directly. This doesn't involve the browser and so can be triggered at any time to terminate all sessions - most commonly in response to a detected threat or increased risk.

 

Universal Logout requires specific integration and can only work with apps that provide APIs for session termination. Part of the proposed IPSIE standard involves defining a standard for the session termination API to make interoperability easier.

 

Why is it called Universal Logout if only certain apps are supported? 

The "universal" term indicates this capability differs from single logout, where we take action against a single app session cookie or within the context of one app. With Universal Logout, we are steadily expanding support through standards-based methods like OIDC backchannel and integrations to achieve logout across a growing ecosystem of apps we already integrate with. While starting with a subset of partners, we’ll continue expanding over time to realize the full vision of Universal Logout. 
 

When is support coming for Universal Logout for Office 365?

With Universal Logout, we are steadily expanding support through standards-based methods like OIDC backchannel and integrations to achieve logout across a growing ecosystem of apps we already integrate with. While starting with a subset of partners, we’ll continue expanding over time to realize the full vision of Universal Logout. 

Technical and Architecture Questions

How does continuous risk assessment in ITP enhance app access security in Okta?

Challenges with traditional app access authorization

In a typical configuration, Okta uses the Global Session Policy (GSP) and Authentication Policy (Auth. Policy) to authorize initial access to resources. Post-initial login, Auth. Policy re-evaluates during access refresh or single sign-on (SSO) for subsequent applications. This leads to challenges in:  

Policy Coverage: Maintaining individual Auth. Policies for each application introduce administrative overhead, often leading to reliance on GSP as a universal security layer.

Engine Migration: Organizations transitioning from the Classic Engine to the Okta Identity Engine (OIE) frequently depend on GSP as their foundational security mechanism.

Static Evaluation: The GSP is not re-evaluated with each resource interaction, thereby missing dynamic contextual changes, such as IP address shifts, that could influence the risk profile.

Continuous assessment in Identity Threat Protection

Identity Threat Protection with Okta AI incorporates continuous risk assessment into adding an adaptive, real-time layer to security protocols, strengthening the overall integrity of application interactions. Key advantages: 

Persistent policy re-evaluation: GSP and Auth. Policy are both subject to continuous assessment throughout the user’s session, ensuring a perpetual security posture.

Contextual risk assessment: Any change in the contextual elements (IP address, session risk, user behavior, etc.) triggers a re-evaluation of the associated risk metrics, providing a more granular and dynamic risk assessment.

Extended intelligence: By ingesting third-party signals (e.g., from Jamf), in addition to 1st party signals from Okta enhances the accuracy and robustness of our risk assessment algorithms.

Mitigation of Session Hijacking: The continuous re-evaluation of GSP negates risk vectors associated with session cookie theft.

On-demand MFA: Anomaly detection through continuous assessment enables the immediate triggering of additional authentication mechanisms inline like MFA.

What are Login, Session, and Entity Risk? 

Identity Threat Protection evaluates three types of risk. 

Login Risk refers to the risk calculated at the initial point of authentication, similar to assessing risk when logging into a banking website. 

Scope: Restricted to the point of login

Signals: Primarily initial authentication signals like device, location, etc.

Use-case: Protect against unauthorized access at the entry point.


Session Risk expands on Login Risk to continuously reevaluate the probability of compromise throughout an active Okta session, like a bank monitoring a user's activity after login for suspicious transactions. Session Risk is scoped only to the current session.

Scope: Confined to a particular session

Signals: Any interaction with Okta during the session, potentially including third-party signals

Use-case: Detect and react to suspicious activities that occur post-login within a session.

Attributes:

  • Risk Level: Low, Medium, High, based on an internal session risk score.
  • Risk Reason: Categorizes the type of attack or suspicious activity detected.


Entity Risk introduces a new paradigm by evaluating risk across the entire spectrum of a user identity, like an individual's credit score. It provides a holistic assessment of the probability a user account is compromised aggregated across sessions, devices, and apps - like a persistent user trust score.

While Session Risk is confined to one session, Entity Risk aims to calculate risk across multiple sessions and even multiple devices. An "entity" refers broadly to any object that requires an identity—this could be a user, device, or even an application. For now, the focus is on "Entity User Risk," which considers the entire risk surface related to a user's identity.

Scope: Not confined to any particular session or device

Signals: All threat surfaces intersecting with the user identity, including device, application, network, and data.

Use-case: Broad, ongoing risk assessment for an identity across various facets and touchpoints.

What is SSF?

The SSF (Shared Signals Framework) is an asynchronous publish-subscribe framework that we leverage in Identity Threat Protection to ingest signals from the security ecosystem. SSF is an open protocol that standardizes the flow of security Events between Transmitters and Receivers. This enables Okta and its Shared Signal Partners like Palo Alto Networks and Jamf to exchange real-time risk data across various threat surfaces, including networks, applications, and cloud environments. 

 

In SSF, an entity can be a transmitter or receiver. A transmitter is a system that sends out security event information to other vendors. For example, Okta can transmit risk data to Apple Business Manager (a receiver), allowing it to make informed security decisions. On the flip side, an SSF Receiver is a system that accepts and acts on these security events. In the context of Okta and Netskope, Okta serves as a receiver, getting information from Netskope about suspicious activities. 

 

By adopting SSF's open, protocol-centric approach, Okta enhances scalability, flexibility, and interoperability, ultimately elevating the security ecosystem and allowing customers to leverage their existing investments.




Learn more about SSF.

How are shared signals used by Okta? 

Any detection event from our integration partners configured with Identity Threat Protection will fire a generic "Partner Reported Risk" event to Okta with either an increased or decreased risk level. Okta admins can take action on this event via Workflows, Entity Risk Policy actions, and other methods. Specific 3rd party partner use cases are also in development to demonstrate the value they provide. For now, any detection by a launch partner will trigger a Shared Signals event.

Who are our current signal-sharing partners?  

For the Early Access release, we are targeting the following partners who will contribute to the shared signals pipeline: 

Security partner vendor

Application

AppOmni

All products

Cloudflare

Cloudflare One Enterprise 

Jamf

Jamf Security Cloud (Jamf Radar)

Netskope

Netskope Cloud Exchange 

Omnissa (Workspace ONE)

Omnissa Access, Omnissa Intelligence, Workspace ONE

Palo Alto Networks

Cortex XDR + Cloud Identity Engine

Rubrik

Rubrik Security Cloud (RSC)

SGNL

All Products

Square X

SquareX Enterprise

WideField Security

All products

Zimperium

Mobile Threat Defense (zIPS)

Zscaler

Advanced Deception

 

What are the differences between Okta Verify device signals and Shared Signals Framework?

Identity Threat Protection leverages two methods for collecting device signals - through Okta Verify integrations and via the Shared Signals Framework (SSF).

Okta Verify provides agent-based signals from EDR threat surfaces through partnerships with CrowdStrike and Microsoft (via Windows Security Center). SSF enables real-time signal sharing across a diverse set of security solutions. While both continuously gather security signals for evaluation, there are some key differences between the two approaches: 

 

Category

Okta Verify Signals

Shared Signals Framework

Partners/Signal Sources

CrowdStrike, Microsoft. See EDR integration signals for more information.

Signal Sharing partners

Communication Method

Agent-to-agent

Server-to-server

Standards Basis

Proprietary expression language (EL)

Industry standards like CAEP

Installation Needs

Okta Verify + supported plugin

Integrations across security systems

Signal Frequency

Continuous based on agent heartbeat

Real-time

Use Cases

Device signals 

Broad threat intelligence sharing


​​​​​​​
 

Is Microsoft leveraged as part of the Shared Signals integration?

Currently, we use the Windows Security Center integration with Okta Verify. Okta Verify signals are used for risk assessment in Identity Threat Protection. We plan to explore integrating with Microsoft's security graph and access the same data powering detections in Azure AD Identity Protection.
 

What is CAEP?

CAEP (Continuous Access Evaluation Protocol / Profile) is a specialized profile of SSF focusing on real-time risk assessment and dynamic access controls. Integrated deeply into Okta's architecture and specifically its Identity Threat Protection offering, CAEP provides immediate session risk updates. This facilitates real-time, inline decisions for threat mitigation, aligning with a comprehensive zero-trust strategy. Adherence to this open standard ensures Okta's interoperability with a broad range of security technologies and platforms. 

Learn more about CAEP
 

How do we distinguish between threat actors using the same IP address?

This is addressed by our Entity User Risk feature, which evaluates risk based on multiple threat surfaces rather than just the IP address. This makes the risk assessment more robust, mitigating the risk of false negatives or positives from the Okta Risk Engine.

 

How Does Okta Handle IP-Chain (X-Forwarded-For) Changes (for example, in proxy/Zscaler environments?

We evaluate not just the source IP but the entire IP-chain present in the HTTP header. This ensures a more comprehensive risk assessment related to IP changes.


 
Loading
Frequently Asked Questions on Identity Threat Protection with Okta AI