strongDM Integrates with Okta and Azure AD
February 03, 2022

strongDM announced a major release, featuring deep integrations with Okta and Azure AD and the ability to create and enforce dynamic access rules.

Businesses can now manage least-privilege access to their critical infrastructure directly from their identity provider, simplifying access management workflows and accelerating development cycles—all while supporting Zero Trust security for hybrid and multi-cloud environments.

While identity providers deliver identity-based access for most web applications, critical infrastructure has been the exception. This gap has put the burden on technical staff to manage disparate workflows, track tickets and approvals, duplicate user and group management structures, and adhere to security policies without violating compliance standards.

But today's infrastructure diversity and ephemerality have pushed this problem beyond human scale. Businesses need an access management solution that centralizes and standardizes all controls, supports a Zero Trust access model, and allows admins to automate workflows and manage access as code.

With this release, strongDM enables businesses to enforce a powerful set of access rules based on attributes such as tags, resource types, and geographic location. Also known as attribute-based access control, access is granted dynamically to roles and their users every time a resource gets spun up or torn down.

Dynamic access controls dramatically simplify the management of permissions and are particularly compelling for those companies that have embraced the infrastructure-as-code mantra, have lots of resources (especially ephemeral ones), and require the flexibility of an access control system that can adapt in lockstep with the infrastructure.

"By connecting identity management solutions with privileged access controls, businesses are finally able to bring identity and access together in one workflow without sacrificing usability, security, or speed," said Justin McCarthy, Co-Founder & CTO at strongDM. "On top of that, because DevOps teams continually strive for greater speed and flexibility, dynamic access controls will help them achieve those objectives, especially as environments become increasingly ephemeral."

With these integrations, businesses can do the following directly from Okta, Azure AD, and any SCIM-based identity provider:

- Centralize employee access to every resource, regardless of location or protocol, with one control plane.

- Instantly authenticate, grant, and revoke just-in-time and audited access to databases, servers, and Kubernetes.

- Replace VPNs and bastion hosts with a secure Zero Trust network.

- Temporarily approve elevated privileges for sensitive operations.

With dynamic access controls, businesses can do the following:

- Manage a rapidly growing infrastructure that has lots of resources, especially ephemeral ones.

- Grant access based on a resource's attributes, not the specific physical resource.

- Use human words and simple sentences to create access rules that dynamically change when resources change (i.e., are brought online or go offline).

- Enforce either role- or attribute-based access controls.

Share this

Industry News

May 01, 2025

Check Point® Software Technologies Ltd.(link is external) announced that its Quantum Firewall Software R82 — the latest version of Check Point’s core network security software delivering advanced threat prevention and scalable policy management — has received Common Criteria EAL4+ certification, further reinforcing its position as a trusted security foundation for critical infrastructure, government, and defense organizations worldwide.

May 01, 2025

Postman announced full support for the Model Context Protocol (MCP), helping users build better AI Agents, faster.

May 01, 2025

Opsera announced new Advanced Security Dashboard capabilities available as an extension of Opsera's Unified Insights for GitHub Copilot.

May 01, 2025

Lineaje launched new capabilities including Lineaje agentic AI-powered self-healing agents that autonomously secure open-source software, source code and containers, Gold Open Source Packages and Gold Open Source Images that enable organizations to source trusted, pre-fixed open-source software, and a software crawling and analysis engine, SCA360, that discovers and contextualizes risks at all software development stages.

April 30, 2025

Lenses.io announced the release of Lenses 6.0, enabling organizations to modernize applications and systems with real-time data as AI adoption accelerates.

April 30, 2025

Sonata Software has achieved Amazon Web Services (AWS) DevOps Competency status.

April 29, 2025

vFunction® announced significant platform advancements that reduce complexity across the architectural spectrum and target the growing disconnect between development speed and architectural integrity.

April 29, 2025

Sonatype® introduced major enhancements to Repository Firewall that expand proactive malware protection across the enterprise — from developer workstations to the network edge.

April 29, 2025

Aqua Security introduced Secure AI, full lifecycle security from code to cloud to prompt.

April 29, 2025

Salt Security announced the launch of the Salt Model Context Protocol (MCP) Server, giving enterprise teams a novel access point of interaction with their API infrastructure, leveraging natural language and artificial intelligence (AI).

April 28, 2025

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the graduation of in-toto, a software supply chain security framework developed at the NYU Tandon School of Engineering.

April 28, 2025

SnapLogic announced the launch of its next-generation API management (APIM) solution, helping organizations accelerate their journey to a composable and agentic enterprise.

April 28, 2025

Apiiro announced Software Graph Visualization, an interactive map that enables users to visualize their software architectures across all components, vulnerabilities, toxic combinations, blast radius, data exposure and material changes in real time.

April 24, 2025

Check Point® Software Technologies Ltd.(link is external) and Illumio, the breach containment company, announced a strategic partnership to help organizations strengthen security and advance their Zero Trust posture.