Contextual access management
Important note
Some functionalities explained in this chapter – for instance, contextual access, dynamic zones, and behavior detection – are only available with licenses for Adaptive MFA and Adaptive SSO products.
With Okta’s contextual access, it becomes possible to use different technologies and combine them into a more complete picture of the user’s situation and requirements. Instead of assigning roles or groups to corresponding policies, Okta can act much more fluidly with a multitude of security vectors that are accessible and known by Okta during authentication activity.
By allowing this context to be used, Okta decides in a much more fine-grained way what to do and how to allow the user to sign in to Okta or the required application(s). Okta can build a risk assessment based on a stack of vectors, such as location, device posture, type of request, timing, and so on. From this, together with group assignments...