Okta Customer Identity (Auth0)
Protect and restore your most Okta CIC important entities and configurations
🔗 Integration Overview
R-Cloud’s integration with Okta CIC protects the data and configuration stored within your Okta Customer Identity Cloud instance. It allows you to recover from accidental or malicious configuration changes with just a few clicks.
Start Protecting Okta CIC and Unlock
- Search, find, and restore the following in one click:
- Tenants
- Tenant Settings
- APIs
- Database Connections
- Social Connections
- Applications
- Flows
- MFA Security Settings
- Universal Login Customizations
- Attack Protection Security Settings
- Assign backup policies with one click to automate all backup operations. Take as many backups and store data as often as needed—all backups are ‘set and forget’ with 100% backup assurance.
- Complete control of your configurations with offsite copies on S3 Compatible Storage
- Immutable, ransomware-proof copies.
Safeguard Okta CIC and your organization with R-Cloud
Okta Customer Identity Cloud is how you manage the identity of customers and partners, and thus are critical to ensure proper business operations. Protecting them from malicious attackers, deletions, and misconfigurations is critical. HYCU can help your organization:
- Safeguard your essential Okta entities and configurations.
- Reduce downtime and data loss.
- Avoid lengthy reconfigurations.
- Keep complete control of Okta configuration and data.
📦 Backup & Recovery Objects
Tenant
Tenant settings (general and advanced)
Applications
Details
- Settings
- Credentials
- Connections
- Organizations
- APIs
APIs
Details
- Settings
- Permissions
Authentication connections
Details
- Database connection (config and applications)
- Social connection (config and applications)
- Enterprise connection (config and applications)
- Passwordless connection (config and applications)
Organizations
Details
- Branding
- Members
- Invitations
- Connections
Users
Details
- Permissions and roles
Roles
Details
- Permissions and users
Branding
Details
- Universal login customizations
- Custom email templates
Security
Details
- Attack protection security settings
- Suspicious IP throttling
- Brute-force protection
- Breached password detection
- MFA security settings
- Status of all the factors
- Settings of phone message and push notification factor
Custom Actions
Flows
Rules
Hooks
Custom domain
Tenant
Tenant settings
API
Application
Database connection
Social connection
Enterprise connection
Passwordless connection
Organization
User
Role
Action
Flow
Rule
Hook
Universal login customizations
Custom email template
MFA security settings
Attack protection security settings
Custom domain