Okta Workforce Identity
Protect and restore your most important Okta entities and configurations
🔗 Integration Overview
R-Cloud’s integration with Okta WIC protects the data and configuration stored within your Okta instance. It allows you to recover from an accidental or malicious configuration change with just a few clicks.
Start Protecting Okta WIC and Unlock
- Search, find, and restore the following in one click:
- Organizations
- Users
- Groups
- Applications
- Administrator Roles
- Resource Sets
- SMS Template
- Network Zone
- UI Schema
- Policy
- Brand
- Behavior Detection Rules
- Identity Provider
- Policy Rule
- Restore specific items to a different source for sandbox seeding use cases.
- Assign backup policies with one click to automate all backup operations. Take as many backups and store data as often as needed—all backups are ‘set and forget’ with 100% backup assurance.
- Complete control of your configurations with offsite copies on S3 Compatible Storage that meets your data residency requirements.
- Immutable, ransomware-proof copies.
Safeguard Okta WIC and your organization with R-Cloud
Okta configurations are the keys to your kingdom; protecting them from malicious attackers, deletions, and misconfigurations is critical. HYCU can help your organization:
- Safeguard your essential Okta entities and configurations.
- Reduce downtime and data loss.
- Avoid lengthy reconfigurations.
- Keep complete control of Okta configuration and data.
📦 Backup & Recovery Objects
Applications
Details
- Config settings
- Assignments (both groups and individual)
- Applications created via the app catalog
- Config within custom applications
- Custom icon logos
- Application affiliated policies
Users and Groups
Details
- Admin role assignment
- User types
- Group rules
- Contents of individually created groups
- Groups mastered by Okta
- User profiles mastered by Okta
Policies & Policy Rules
Details
- Authentication policy
- Global session policy (Sign-On Policy)
- Profile enrollment policy
- Password policy
- Behavior detection
- IdP routing rules
- MFA enrollment policy
Reports
Details
- System logs
API
Details
- Trusted origins
- Authorization servers
Network Zones
Profile Enrollment
Details
- Enrollment policy UI schema
Customizations
Details
- Branding
- Domain
- Footer (privacy policy text)
- SMS templates
Administrators
Details
- Roles
- Resource sets
Identity Providers
Organization
Administrator Role
Application
Behavior Detection Rule
Brand Customizations
Custom Domain
Policy
Policy Rule
Resource Set
Authorization Server Policy Rule
Role
SMS Template
Trusted Origin
UI Schema
User
User Type
Authorization Server
Authorization Server Claim
Authorization Server Scope
Authorization Server Policy