<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Want to learn how eliminating credentials can boost your productivity (and happiness)? Watch our on-demand webinar!

StrongDM kicks it into overdrive

Newest product release deepens integrations with Okta & Azure AD and adds dynamic access rules to StrongDM’s arsenal
StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

Following on the heels of our recent announcement of 2022 being the Year of Access, StrongDM continues to ease friction and remove the barriers standing between technical staff and access to the resources they need—without sacrificing security—with our latest product release.

We’ve made it even easier to manage access to backend infrastructure in an increasingly ephemeral computing environment. Simply put, this is the most impactful, far-reaching release we’ve done to date, and early feedback from our customers has been a resounding “yassssssss.”

Take a look.

Simplify Provisioning with Deeper Identity Provider Integrations

We listened to our customers and, by far, the feature everyone was clamoring for was deeper integrations with identity providers. In fact, according to our recent survey, 53% of organizations take hours or weeks to grant access to infrastructure. Additionally, 88% of organizations require two or more persons to approve access requests.

With the release of tighter integrations with Okta and Azure AD (or any SCIM-based directory service for that matter), you now have the ability to manage just-in-time, least-privilege access to your critical infrastructure right from your preferred identity provider (IdP), dramatically reducing the time needed to approve requests and grant access.

This means increased developer productivity and faster development cycles, all while supporting Zero Trust security for hybrid and multi-cloud environments. Not too shabby, eh?

More specifically, you can now:

  • Automate user and group provisioning with a single source of truth.
  • Synchronize Role assignments from your IdP to StrongDM.
  • Choose which users and groups of users you want your IdP to manage in StrongDM.
  • Manage policy exceptions via StrongDM by assigning IdP-managed users to StrongDM-managed Roles or StrongDM-managed users and service accounts to IdP-managed Roles.
Okta UI assigning applications Okta UI SCIM StrongDM provisioning

Here’s a more in-depth product video that gives you a taste of what these integrations can do.

Get More Flexibility with Dynamic Access Rules

A perfect complement to static access rules, dynamic access rules eliminate loads of manual administrative work, giving businesses more granular control when provisioning infrastructure and enabling staff to access the resources they need more quickly.

Dynamic access rules enable businesses to enforce a powerful set of rules based on attributes such as tags and resource types. With this model, also known as attribute-based access control (ABAC), access is granted dynamically to Roles and their users every time a resource gets spun up or torn down.    

This is particularly useful for companies with large installed bases with lots of resources on the backend, especially ephemeral ones. Basing access rules on tags offers much more flexibility with so much ephemerality in today’s computing landscape.

If you’re interested in seeing dynamic rules in action, check out this short video and let us know what you think. Good or bad. 

New to StrongDM? Sign up for our free no-BS demo and discover how frictionless Zero Trust can work for you. Or, feel free to check out the results of our survey to see how you stack up against your peers.


About the Author

, Dynamic Access Management platform, StrongDM puts people first by giving technical staff a direct route to the critical infrastructure they need to be their most productive.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

The Annual Access Audit Survival Guide
The Annual Access Audit Survival Guide
So, you’ve decided to conduct an annual access audit. Now comes the obvious question: where do I start? Just like you wouldn’t embark on a mountain climbing excursion without a clear understanding of the terrain and gear you need, the starting point for an annual access audit requires an understanding of the process, people, and tools you’ll need to get started. Let’s go!
Annual Access Audit: What Is It and How to Conduct It?
Annual Access Audit: What Is It and How to Conduct It?
The great outdoors and your infrastructure have more in common than you might think. Both environments have diverse ecosystems and unique terrain, but they can also feel wild and untamed. In the spirit of adventuring and access, we wrote this blog to help you learn why you should conduct an annual access audit every year.
Vault Sprawl: How To Manage Multiple Secret Vaults
Addressing Vault Sprawl: How To Manage Multiple Secret Vaults
Secret vaults ensure that sensitive and privileged credentials are well protected, rotated, and only used–or checked out–when necessary. This makes them a critical and foundational tool for credential protection in modern infrastructures.
Top 3 Least Privilege Risks (And How to Address Them)
3 Reasons Why Least Privilege Has Failed
The inability to audit, track, and understand how permissions are being used (or if they’re used at all) has been non-existent. Until now. The findings are clear: organizations need visibility into privileged access and its usage to fully understand and address their total attack surface.
AWS Management Console resources
Connect to Even More Resources with StrongDM’s AWS Management Console
We’ve just launched our AWS Management Console, adding yet another supported authentication method to improve control and auditability–so you can protect your business and improve employee productivity.