BEYOND IDENTITY AND OKTA - PASSWORDLESS AND CONTINUOUS RISK-BASED ACCESS - PARTNER SOLUTION BRIEF

Page created by Emily Clarke
 
CONTINUE READING
BEYOND IDENTITY AND OKTA - PASSWORDLESS AND CONTINUOUS RISK-BASED ACCESS - PARTNER SOLUTION BRIEF
PARTNER SOLUTION BRIEF

BEYOND IDENTITY
AND OKTA
PASSWORDLESS AND CONTINUOUS RISK-BASED ACCESS
BEYOND IDENTITY AND OKTA - PASSWORDLESS AND CONTINUOUS RISK-BASED ACCESS - PARTNER SOLUTION BRIEF
REPLACE PASSWORDS WITH                             IMPLEMENT CONTINUOUS,
                                                    RISK-BASED ACCESS
                                                                                                         OKTA IS NOW
 FUNDAMENTALLY SECURE
 AUTHENTICATION                                     Enhance access policies with fine-grained            PASSWORDLESS!
 Increase the value of your existing Okta single    risk signals and device security posture data
                                                    provided by the Beyond Identity Authenticator.
                                                                                                         PROTECT DATA AND RESOURCES
 sign-on investment by eliminating passwords
                                                                                                         Reduce a major source of risk by eliminating
 and replacing them with an authenticator,
                                                                                                         account takeovers from compromised credentials.
 powered by proven, tested, secure technology:      Make continuous risk-based access decisions
 asymmetric keys and X.509 certificates. There’s    based on fine-grained risk signals from
                                                    applications, users, and their devices.
                                                                                                         FRICTIONLESS USER EXPERIENCE
 no key or certificate management required
                                                                                                         Access applications from every device, without
 by admins or end users, the Beyond Identity
                                                                                                         passwords, one-time codes, or having to pick up
 Authenticator manages it all.                      Utilize security posture data from every
                                                                                                         a second device.
                                                    device requesting access, without the need
 SEAMLESS ACCESS TO                                 for a third-party tool or complex integrations.
                                                                                                         CONTINUOUS RISK-BASED
 DESKTOP AND CLOUD APPS                                                                                  AUTHENTICATION
 FROM ALL DEVICES                                   Device security posture available for each device:
                                                                                                         Enforce dynamic access decisions based on the
 Users download the Beyond Identity                    •   OS Version                                    risk-level of users, devices, and apps, including
 Authenticator and activate their credentials          •   Password protection status                    built-in granular device security posture data.
 on each of their devices. No passwords,               •   Biometric enablement status
 no one-time codes, no need to pick up a               •   Secure enclave status                         SAVE IT AND HELP DESK COSTS
 second device. Provide a passwordless login           •   Hard drive encryption status                  Enable users to self-serve, register, and recover
 for all device types, across the most popular         •   Firewall enablement status                    their own passwordless credentials to reduce
 operating systems. Enable passwordless access         •   Gatekeeper enablement status                  lockouts and help desk calls.
 to domain joined desktops, and web-based              •   And more!
 and native apps. Users can self-serve, register,                                                        SIMPLIFY AUDIT AND
 and recover their devices – reducing lockouts,                                                          COMPLIANCE PROCESSES
 improving user productivity, and reducing                                                               Export an immutable record of each login
 IT/Help Desk workloads.                                                                                 transaction for streamlined reporting.

DATASHEET | PARTNER SOLUTION BRIEF                                                                                                                           02
BEYOND IDENTITY AND OKTA - PASSWORDLESS AND CONTINUOUS RISK-BASED ACCESS - PARTNER SOLUTION BRIEF
To get started, simply add Beyond Identity as a delegate identity provider in your
                                     Okta environment. Beyond Identity is a cloud-native solution that employs standard
                                     OpenID Connect flows. The integration requires only a few minor configuration settings
                                     within Okta and does not require any coding. When an end user requests access to an
                                     enterprise application, the application will delegate to Okta, and Okta subsequently
                                     delegates authentication responsibilities to Beyond Identity.

                                                                                                       BEYOND IDENTITY

                       DEPLOY IN                                                                        AUTHENTICATOR

                       LESS THAN      1                                2                          3

                       1 HOUR               Add Beyond Identity as
                                             a delegated identity
                                                                           Okta-enabled apps
                                                                           delegate identity to
                                                                                                       Invite users to self-enroll,
                                                                                                      download Beyond Identity
                                             provider and add a            Beyond Identity via        Authenticator, and activate
                                             routing rule in your           OpenID Connect                credentials on their
                                             Okta single sign-on                                             trusted devices
                                                 environment

DATASHEET | PARTNER SOLUTION BRIEF                                                                                                    03
BEYOND IDENTITY AND OKTA - PASSWORDLESS AND CONTINUOUS RISK-BASED ACCESS - PARTNER SOLUTION BRIEF
ABOUT BEYOND IDENTITY                                ABOUT OKTA
Headquartered in New York City, Beyond Identity      Okta is the leading independent provider
was founded by industry legends Jim Clark            of identity for the enterprise. The Okta
and Tom Jermoluk to eliminate passwords and          Identity Cloud enables organizations
radically change the way the world logs in,          to securely connect the right people to
without requiring organizations to radically         the right technologies at the right time.
change their technology stack or processes.          With over 6,500 pre-built integrations to
                                                     applications and infrastructure providers,
Funded by leading investors, including               Okta customers can easily and securely
Koch Disruptive Technologies (KDT) and New           use the best technologies for their
Enterprise Associates (NEA), Beyond Identity’s       business. Nearly 8,400 organizations,
mission is to empower the next generation of         including Engie, JetBlue, Nordstrom,
secure digital business by replacing passwords       Takeda Pharmaceutical, Teach for
with fundamentally secure X.509-based                America, T-Mobile, and Twilio, trust Okta
certificates. This patents-pending approach          to help protect the identities of their
creates an extended Chain of Trust™ that             workforces and customers.
includes user and device identity and a real-
time snapshot of the device’s security posture
for adaptive risk-based authentication and
authorization. Beyond Identity’s cloud-native
solution enables customers to increase business
velocity, implement new business models,
reduce operating costs, and achieve complete
passwordless identity management. Visit
beyondidentity.com for more information.

Learn more at beyondidentity.com
© 2020, Beyond Identity, Inc. All rights reserved.
You can also read