<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Okta Privileged Access and Individual Access Policies for Non-Human Accounts
Privileged Access
Okta Identity Engine
Overview
This article addresses the following question: 
  • Can Okta Privileged Access (OPA) ensure properly configured individual access policies for non-human accounts, defining access rules and permissions?
Applies To
  • Okta Privileged Access (OPA)
  • Access Policies for Non-Human Accounts
Solution

OPA can discover and manage non-human accounts or other shared privileged accounts - such as Service Accounts or other built-in accounts like Root/Administrator. These accounts, once managed, can be added into policies that grant only authorized users access to login with them and optionally enforce per-attempt MFA or an Access Request before they are granted access. These sessions can also be recorded. All of the events related to these accounts are also logged to the Okta System Log.
 

Related References

Loading
Okta Privileged Access and Individual Access Policies for Non-Human Accounts