Okta and Yubico partner to offer strong adaptive authentication

December 4, 2017 2 minute read
Okta with YubiKeys

With the increasing frequency and scale of identity threats including phishing and man-in-the-middle attacks (MiTM), the best way to prevent a breach is to provide strong multi-factor authentication (MFA). MFA is designed to protect against the range of attacks that rely on stealing user credentials. Organizations can use a variety of techniques, but all work by requiring the user to provide something in addition to their primary password— something the user is, has, or knows—before they can be authenticated.

Deploying strong MFA that is easy-to-use for employees and easy-to-manage for admins can be quickly accomplished with Okta’s Adaptive MFA and the unphishable YubiKey. Adding the YubiKey as a hard token to the Okta Adaptive MFA solution strengthens the MFA by requiring the user to have a physical token verifying their identity. This is also a great option for global organizations that need to provide strong authentication to comply with regulations such as the European Union’s General Data Protection Regulation (GDPR).

Okta logo
Ecosystem Showcase: Okta

Adaptive authentication means the level of authentication required is flexible depending on how much risk a user presents. Every time a user logs in using Okta Adaptive MFA, the system analyzes the request to determine how much access to grant.

With strong MFA in place, even if a user’s password is stolen, user accounts are safe from unauthorized access. Enabling Okta’s MFA and pairing with the YubiKey, will protect business-critical data from the most prevalent attacks on the Internet today.

Special Offer for Yubico Customers: Try Okta free for 30 days to increase security, improve user productivity and make your IT team more efficient.

Yubico is proud to highlight Okta as part of an ongoing YubiKey ecosystem awareness program. Visit our Featured Solutions page to learn more about all the products and services that support the YubiKey.

Share this article:

Recommended content