Extensive practical experience in implementing and administering OKTA applications.
Proficient in troubleshooting access-related issues, group management, user management and password policy matters, privileged access.
Collaborated closely with business owners to gain comprehensive understanding of application requirements and successfully onboarded them into OKTA. Has working knowledge as an SME.
Conducted meticulous evaluations of applications to determine their compatibility for integration with OKTA based on prioritization, facilitating seamless user access across multiple platforms.
Integrated Active Directories, Lightweight Directory Access Protocol (LDAP) and extensively worked on SAML, SSO, OIDC, OAuth security protocols.
Has great hands-on experience in handling Service Requests, Change Requests, Auto Tickets and User Tickets on ServiceNow and BMC Remedy Ticketing tools.
Has knowledge on application migration from OKTA to Microsoft Entra ID (Azure Active Directory).
Has worked on Windows Server, Windows NT, Linux and macOS platforms.
Integrated applications into OKTA by collaborating with application teams to gather requirements for onboarding applications into OKTA.
Handled integration of AD Agents and performed version upgrades.
Whitelisted IP addresses for accessing the site in OKTA.
Resolved application assignment issues and troubleshooted user end problems.
Configured password policies and authentication policies.
Experience in configuring MFA authenticators, adaptive MFA rules and behavioral authentication.
Created OKTA sign-in policies and set up identity providers with routing rules.
Assisted application development teams in configuring OIDC related client configurations.
Has an overview of Delegated Authentication and Role Based Access provisioning.
Worked with Automation and Event hooks workflows.
Handled L2 tasks assigned to me since day one, adhering to client standards and delivering high-quality work on time.
Responded promptly to emails related to L3 or L2 tasks in our queue.
Monitored Splunk alerts for password reset and conducted daily monitoring.
Contributed to dashboard clean-up activities, improving troubleshooting capabilities for application-level issues.
Managed L2 incidents, including activation/deactivation, application access assignment, attribute updates, application onboarding, URL changes, certification renewals and user groups management.
Worked in 24/7 shifts to promptly address user incidents based on priority.
Conducted comprehensive analysis of various single sign-on (SSO) vendor options, such as AWS IAM and Azure AD, ensuring alignment with business requirements. This involved evaluating their features, compatibility, and scalability.
Implemented chosen SSO solution, facilitating streamlined access management for users.
Has worked on configuring Agentless/Desktop SSO.
Has knowledge on OKTA Access Gateway.
Led the team responsible for managing SSL/TLS certificates, enabling SAML encryption and SAML signature.
Successfully managed application integrations and migrations across all phases (Development/Stage/Production). This involved coordinating with different teams and ensuring smooth transition with minimal downtime.
Configured various authentication adapters, including Kerberos, HTML, and MFA, and implemented authentication chaining using CIDR, improving security and user experience.
Effectively configured authentication selectors to control network-level authentication and browser-based user logins, enhancing access control.
Collaborated with internal monitoring and IT operations teams to establish and enforce service monitoring policies, ensuring system availability and performance.
Assisted SAML application owners in understanding their initial requirements and guided them through the onboarding process with the local Identity Provider (IDP), facilitating seamless integration.
Actively participated in the Change Advisory Board (CAB), contributing to scheduling zero-downtime production change windows and minimizing disruptions.
Displayed expertise in troubleshooting internal and external application issues, as well as LDAP issues, promptly resolving them to maintain system functionality.
Has knowledge on Microsoft Entra ID(Azure Active Directory) like MFA, SSO, SSPR.
Has an overview of AWS IAM policies.
AWS CloudWatch, AWS Simple Notification Service
Have knowledge on OKTA to Microsoft Entra ID(Azure Active Directory) migration.
Active Directory Federation Services (ADFS)
Microsoft Active Directory
Active Directory Federation Services
User Identity Management