White Paper
Securing Office 365 with Okta
Securing Office 365 with OktaSecuring Office 365 with Okta 2 Index 3 4 6 8 9 23 25 25 25 Background Terms & Definitions Introduction Office 365 Authentication Methods Securing Federated Office 365 Using Okta Known Email Clients that Support Modern Authentication Conclusion References DisclaimerSecuring Office 365 with Okta 3 Background As the leading independent provider of enterprise identity, Okta integrates with more than 5500+ applications out-of-the-box. Most of these applications are accessible from the Internet and regularly targeted by adversaries. Okta’s security team sees countless intrusion attempts across its customer base, including phishing, password spraying, KnockKnock, and brute-force attacks. They continuously monitor and rapidly respond to these attacks to protec