LOGIN
REGISTER NOW
 

Okta DEMO ROOM

Executive Overview

David Fesperman
Principal Security Advisor

A discussion of best practices for securing NHIs via comprehensive visibility, privileged access, and full application security.

Play Now

Technology Demo

Okta Identity Security Posture Management (ISPM)

See how to protect service accounts, tokens, AI agents, and get centralized security for all NHIs across your cloud, apps, and infrastructure

  • 2 Minute Intro
  • 5 Minute Product Tour
  • Deep Dive Demo

The Role of AI at Okta

A review of Okta's broad integration of AI across its extensive technology platform for threat detection, risk assessment, and automation, embedded in both its Workforce Identity Cloud and Customer Identity Cloud.

The Role of AI at Okta

Use Case Demos

Service Account Classification

  • Human vs service accounts
  • Naming & IP-based detection
  • Direct logins vs SSO use
  • MFA gaps for service users

NHI Discovery

  • View all non-human entities
  • Tokens, keys, agents shown
  • Cross-app privilege map
  • Filter admin & super admins

Stale Login Methods

  • Unused keys & passwords
  • Unrotated admin tokens
  • Direct link to remediate
  • Ticket & chat integrations

Partial Offboarding

  • Detect leftover access
  • Human + API key overlap
  • HR offboard mismatch
  • Graph view of access paths

Unauthorized Apps

  • Detect shadow IT installs
  • Flag risky OAuth grants
  • User-installed app list
  • Exposed Salesforce cases

End-to-End Workflows

  • Auto-remediate via Okta
  • ISPM-triggered actions
  • GitHub + Slack alerts
  • Detect leaked keys fast

Additional Resources

We embrace neutrality to give organizations, employees, and end users greater flexibility, regardless of the devices or technology at hand. Learn about the Okta Platform and Auth0 Platform and how they’re helping everyone secure and control their digital presence.


SEGMENT
Identity
Non-Human Identity