Okta for Developers’ cover photo
Okta for Developers

Okta for Developers

Software Development

San Francisco, California 6,615 followers

Follow along for tutorials, webinars, videos, events, updates, and news about our developer advocacy activities.

About us

Resources for developers using Okta’s Identity services: Okta's Customer Identity Cloud (aka Auth0 by Okta or CIC) and Workforce Identity Cloud (WIC). Follow us here for tutorials, webinars, videos, events, product updates, and news. Keep up with our global team of developer advocates.

Website
https://developer.okta.com
Industry
Software Development
Company size
1,001-5,000 employees
Headquarters
San Francisco, California
Type
Public Company
Founded
2009
Specialties
programming, authentication, application development, application security, and API security

Locations

Employees at Okta for Developers

Updates

  • Okta for Developers reposted this

    Wow, my first Techorama Belgium was great 🏰 An inspiring experience at Belgium’s leading conference for IT developers & architects. Some key takeaways I’m bringing home this year: ⚔️ Beyond the AI hype: what’s real today, what’s next, and how enterprises are preparing for AI adoption at scale ⚔️ AI agents are rapidly moving into production — governance, trust, observability and security are becoming essential ⚔️ The A2A ecosystem is evolving fast: AgentMesh, MCP security extensions (= the new XAA protocol), agent identity and enterprise-grade interoperability are becoming serious topics ⚔️ Design MCP tools around user tasks, not endpoints ⚔️ The WebMCP API enables web apps to expose JavaScript tools so agents understand how to interact with them... ordering products right from your prompt is a reachable goal ⚔️ Multi-agent systems are powerful… but only when a single agent is no longer enough ⚔️ “An AI app is just an app” — good engineering fundamentals still matter most... developers initialize agents in code ⚔️ LLMs should be treated like stateless microservices: no memory, no state after the job completes. On the other hand: Agents should write logs and save & retrieve memory dumps ⚔️ Try to interact with agents through message-driven protocols, not REST calls ⚔️ Every AI-agent architecture eventually becomes a combination of a harness (prompting, memory handling, retries, tool execution, guardrails, observability, security, workflows…), directory (place where agents, tools, policies, capabilities or services can be discovered and described) and an LLM ⚔️ Extending agents with plugins will become crucial for enterprise adoption... Plugins contain skills ⚔️ Human-in-the-loop applications are everywhere in enterprise AI ⚔️ API quality should be treated as a top-level product metric ⚔️ AI evaluation reports and quality reporting are becoming essential for enterprise-grade applications ⚔️ Event-driven architecture patterns like transactional outbox, sagas, scatter-gather and event versioning remain highly relevant in modern distributed systems ⚔️ Self-healing systems, reusable DevOps pipelines and platform engineering are becoming standard expectations ⚔️ More and more companies are evaluating a migration from the classic DevOps towards GitHub ⚔️ “Characterise the systems you build — capabilities, not customisations” ⚔️ DDD vs EA... Autonomy <---> Coupling... Which direction do you go? Oh so important to know that every decision has a huge impact on interconnectivity and rework And honestly… the medieval knights & castles theme made the whole experience even more memorable 🏰 Already looking forward to the next edition. Speakers & sessions that stood out to me: Richard Campbell, Massimo Crippa, Bruno Capuano, Justin Yoo, J. Alisa Duncan, Boyan Mihaylov, Poornima Nayar, Joren Scheepers, Wannes Maes, Sakari Nahi, Bart Wullems, Rockford Lhotka, Yanko Dzhemerenov, David Whitney, Dwight Matthys, Clemens Vasters, and Laïla Bougriâ.

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +2
  • Okta for Developers reposted this

    “Uniting divided MCP appdoms with OAuth and Cross App Access” by J. Alisa Duncan from Okta. The session explored how enterprise AI applications and MCP-based systems are increasingly operating across isolated application domains, where security, identity, and governance become critical challenges. A particularly interesting aspect was the focus on how AI agents and MCP applications can exchange context and capabilities while maintaining verifiable identity and centralized governance. The session highlighted how protocols like MCP are pushing identity and authorization models to evolve beyond traditional user-centric integrations toward secure agent-to-agent and app-to-app collaboration models. #MCP #OAuth #Identity #AI #AgenticAI #Security #Techorama #SoftwareArchitecture

    • No alternative text description for this image
  • Join us for an in-person meetup on May 20 at the Okta HQ in San Francisco to connect with developers building with Okta Workflows. 🚀 🎙️ What's on the agenda: ▪️ Automating Identity Defense - Learn how to connect ISPM insights to Workflows for instant risk reduction ▪️Automating Helpdesk Caller Verification - Native push notifications + Delegated Flows (no third-party tools needed) ▪️Real-world automation use-case - How BitGo automated 700 EntraID UPN updates with Workflows ▪️Product roadmap sneak peek - Flow versioning and AI Builder 🥂 Plus: networking, light dinner, and drinks. 📋 Details: 📍 Okta HQ, San Francisco 📅 Wednesday, May 20 | 5:30 - 7:30 PM PT 🎟️ Register here: https://luma.com/87n5or4m #Workflows #Oktadev #Okta #Identity #Automation #Developer #meetup

    • No alternative text description for this image
  • 100+ developers, architects, and founders joined us at Okta HQ in San Francisco for Okta Developer Connect, and the energy in the room was incredible. 🔥 From Cross App Access (XAA) and modern OAuth patterns to securing AI agents and hands-on labs, the discussions throughout the day made one thing clear: identity is becoming the control plane for how AI systems securely operate across apps and APIs. We also had an AI Interview survey, where attendees shared how AI is reshaping the way developers build, debug, and ship software today. Great conversations, technical sessions, happy hour, drinks, networking, and a packed room of builders thinking deeply about the future of AI and identity. 🚀 Special thanks to Chukwuemeka Afigbo, Michael Palermo & Akanksha Bhasin for hosting, Alisa Duncan for moderating the panel, and to Jack Hirsch, Aaron Parecki, Semona Igama, Mira Sharma, Fred P., Ganapathy Ananthakrishnan, Max Katz, all the volunteers, and the entire Okta & Auth0 for making the event a huge success. ❤️ #Okta #OktaDev #ODC #AI #Agents #Security #OAuth #Identity #Devs

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +10
  • Okta for Developers reposted this

    Now that the dust has settled from #OktaDeveloperConnect, it's a good time to summarize the takeaways from the sessions. Sadly they are not recorded, because I would love to re-watch. Jack Hirsch delivered an impactful keynote that underscored how identity/security are playing out in deals, what CISOs are requiring, and the cost of not doing the business the right way when it comes to launching AI-powered applications. I had not had the opportunity to listen to Hirsch before, and now I can’t wait until the next opportunity. Now I have had the opportunity to listen to Aaron Parecki in a panel context, and he anchored the agentic discussions to OAuth, which was quite helpful. At ODC, he drilled down into #CrossAppAccess, which has turned out to be a crucial spec, including its critical role in MCP. He got there by first tying things to OAuth2, which was extremely insightful for me to crystalize context. Then, I was joined (and upstaged, of course) by Mira Sharma for our talk on Securing AI Agents, which was well received, and gave a good glimpse of where Auth0 is heading with first-class agents (Agents as Principals) and we got to mention some great work by one of our colleagues, Deepu K Sasidharan who pushed out two wonderful repos (https://lnkd.in/gWWNkDA5 and https://lnkd.in/g7GVJM9a) for those of us obsessed with leveraging #Auth0 for things like Anthropic's #ClaudeCode and OpenClaw. Next, we had a lively panel discussion (with J. Alisa Duncan, Jack Hirsch, Chukwuemeka Afigbo, Ganapathy Ananthakrishnan, Mira Sharma, and myself) that addressed timely questions about trends, invited some hot takes, and offered some revealing insights from some subject matter experts. Then, Semona Igama provided an engaging workshop on Cross App Access, and answered some of the questions that I always wanted to know, but was afraid to ask. The whole room was able to get through the whole from, whether on laptops or phones. Akanksha Bhasin and J. Michael Palermo IV were brilliant MCs and we had a fine team of volunteers to keep things moving like a well-oiled machine. Things culminated with an engaging networking session that seemed to pick up from where the lively panel Q&A ended. Thanks to everyone involved, from organizers to participants: it was a wonderful event. Thanks you Okta for including we Auth0s.

    • No alternative text description for this image
  • Okta for Developers reposted this

    In San Francisco this week. 🌁 I am excited for the Okta Developer Connect SF edition that we're hosting on April 30th (tomorrow) at the Okta HQ. 🎉 It’s a half-day event around identity + AI - mostly focused on securing AI Agents and how agents are starting to operate across systems and what that means for access, permissions, and security. 👾 ❤️ Already 250+ people have signed up, and we still have a few spots open. If you’re in SF, feel free to join. Register here: https://lnkd.in/gfTc3PGh Would be great to meet you all in person. Okta for Developers, Auth0, Okta

    • No alternative text description for this image
  • Reading about secure AI systems is one thing. Seeing them in action is different. That’s exactly why https://xaa.dev exists. A sandbox where you can: ✅ Walk through end-to-end flows ✅ See how identity moves across apps ✅ Understand how access is granted on behalf of a user No setup. No guesswork. Just a clear view of how Cross App Access works in practice. 🌉 If you want to go deeper, we’re bringing this to life at our flagship Okta Developer Connect in San Francisco tomorrow, with talks and conversations over drinks and networking with teams building in this space. https://luma.com/v2tmx6bf #Developers #AI #Security #OAuth #Okta

  • AI agents are already operating across systems. 🌐 On April 30 at Okta HQ in San Francisco, we’re bringing developers together at Okta Developer Connect to break down how to actually secure them. 🔐 They’re calling APIs, moving across apps, and acting on behalf of users. The real challenge is not building them. It's about controlling what they are allowed to access. What we will cover: ▪️ Unlocking AI in the Enterprise ▪️ Cross App Access and modern OAuth patterns ▪️ Securing AI agents with identity ▪️ Hands-on lab Welcome lunch, drinks, and networking with teams building in this space. 🥂 🌉 Join us: https://lnkd.in/gccGU2yZ #Okta #OktaDev #AI #Security #Devs #OAuth #Enterprise #Startups

    • No alternative text description for this image

Similar pages

Browse jobs