![A Solution Overview and Architecture for an Okta Based Customer Identity and Access Management | by Eddie Yao | Medium A Solution Overview and Architecture for an Okta Based Customer Identity and Access Management | by Eddie Yao | Medium](https://miro.medium.com/v2/resize:fit:2000/1*1Wvclw1Cd1kg81Jcw5gIVw.png)
A Solution Overview and Architecture for an Okta Based Customer Identity and Access Management | by Eddie Yao | Medium
![Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2021/06/30/End-to-end-ABAC-strategy-1.png)
Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog
![Securing AWS Access with Okta. In this guide we will break it down and… | by James Wu | Tubi Engineering Securing AWS Access with Okta. In this guide we will break it down and… | by James Wu | Tubi Engineering](https://miro.medium.com/v2/resize:fit:1358/1*ukCKLCHMzi9u9U2BANahew.png)
Securing AWS Access with Okta. In this guide we will break it down and… | by James Wu | Tubi Engineering
![Implement role-based SSO from Okta - Resource Access Management - Alibaba Cloud Documentation Center Implement role-based SSO from Okta - Resource Access Management - Alibaba Cloud Documentation Center](https://help-static-aliyun-doc.aliyuncs.com/assets/img/en-US/9690549951/p128782.png)
Implement role-based SSO from Okta - Resource Access Management - Alibaba Cloud Documentation Center
![Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2021/06/30/End-to-end-ABAC-strategy-3.png)
Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog
![Securing Access Through Attribute-Based Access Control (ABAC) in AWS | by Rahul Grover | Slalom Build | Medium Securing Access Through Attribute-Based Access Control (ABAC) in AWS | by Rahul Grover | Slalom Build | Medium](https://miro.medium.com/v2/resize:fit:1400/1*4HBOH4m_d2dZTnddcoDvsQ.jpeg)
Securing Access Through Attribute-Based Access Control (ABAC) in AWS | by Rahul Grover | Slalom Build | Medium
Streamlining Snowflake Access Control: Empower Your Enterprise with Okta Workflow, Google Sheets, and Snowflake Default Role Management | by Deepam Kanjani | Snowflake | Medium
![Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog Build an end-to-end attribute-based access control strategy with AWS IAM Identity Center and Okta | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2021/06/30/End-to-end-ABAC-strategy-5.png)