Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Configure Jira OAuth/OIDC SSO Integration with Okta | Step-by-Step Guide

Manually managing user authentication in Jira can lead to security gaps and administrative overhead. By integrating Okta with Jira using the miniOrange OAuth/OIDC SSO plugin, you can provide your team with a seamless, secure, and centralized login experience. In this video, we walk you through the entire end-to-end configuration: from setting up a Web Application in the Okta Admin Console to finalizing the OAuth settings within Jira. You’ll see exactly how to map Client IDs, secrets, and endpoints to get your SSO up and running in minutes.

Rethinking SaaS access security after login

Most organizations have gotten very good at protecting the front door. We invest heavily in single sign-on (SSO), mandate multi-factor authentication (MFA), and lock down who can log in, from where, and under what conditions. We do everything to ensure that the right user has the right access. But one critical question often still goes unanswered: What really happens after someone logs in?

Insider Threat Prevention: Steps, Types & Detection Tools

When security leaders talk about risk, the conversation usually drifts toward ransomware gangs, zero-day exploits, or state-sponsored actors. Fair enough. Those threats are loud and visible. Yet many of the most damaging breaches begin somewhere quieter. Inside the organization. An employee exporting a customer database before resigning. A contractor reusing credentials across systems. A system administrator with broad privileges and very little oversight.

How to Configure Confluence OAuth/OIDC SSO Integration with Keycloak | Step-by-Step Guide

Simplify your team's access to documentation by centralizing authentication. By integrating Keycloak with Confluence using the miniOrange OAuth/OIDC SSO plugin, you can provide a secure, one-click login experience while maintaining full control over your user identity data. In this video, we walk through the end-to-end setup: starting with creating a Client in the Keycloak Admin Console and finishing with the final configuration in the Confluence Administration dashboard. You will see exactly how to manage Realm settings, redirect URIs, and attribute mapping to ensure a smooth SSO flow.

How to set up the OTP Verification plugin with Tutor LMS Login Form?

The miniOrange OTP Verification Plugin helps verify the authenticity of email addresses and mobile/phone numbers during login. OTP Verification sends a unique One-Time Password (OTP) to users, ensuring that the provided contact details are genuine and accessible. This helps prevent fake logins and improves overall website security. In this video, we will walk you through the step-by-step process of setting up the miniOrange OTP Verification plugin with the Tutor LMS Login form. Secure your Tutor LMS login process and allow only verified users to access your platform.

Why traditional fraud detection tools struggle to catch identity mules

Traditional detection methods and point solutions often focus on fraud detection at a single point. Identity platforms and orchestration layers help fraud fighters detect patterns and stop scaling attacks. But there’s a growing fraud vector called identity muling that’s particularly difficult for some fraud systems to detect. Below, we’ll explore how identity muling works, what it looks like from a fraud fighter’s perspective, and what you can do to protect your organization.

Bringing SharePoint Goodness into Drupal

Microsoft SharePoint - one of the most used platforms for storing, organizing, sharing, and accessing information across multiple devices. It is widely used by enterprises big and small; and across a range of industries be it Healthcare, Finance and Insurance, Government and more. And if there’s one CMS that shines in those industries, that’s Drupal. So how about we bring SharePoint capabilities into Drupal? That’s exactly what we’ve achieved.

Why identity security is a production asset in manufacturing

When a production line stops, the clock starts ticking. In manufacturing environments I’ve worked in, every minute of downtime can translate into missed delivery commitments and revenue you’ll never see again. How long that outage lasts will be decided in the first few minutes, when identity ownership and decision authority are still being sorted out. That authority gap is easy to underestimate. Manufacturing leaders already plan extensively for physical disruption.