27 comments

  • glemmaPaul2 minutes ago
    Anyone that uses Okta should be accepting the fact that they have outsourced a huge chunk of responsibility of their job onto an enterprise company.
  • cedws2 days ago
    That’s funny. I spotted a similar issue in their Go SDK[1] a few years back. I was pretty appalled to see such a basic mistake from a security company, but then again it is Okta. [1]: <a href="https:&#x2F;&#x2F;github.com&#x2F;okta&#x2F;okta-sdk-golang&#x2F;issues&#x2F;306" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;okta&#x2F;okta-sdk-golang&#x2F;issues&#x2F;306</a>
    • cookiengineer9 hours ago
      Kind of funny that stalebots are the new &quot;won&#x27;t fix&quot; methodology to ignore security issues with plausible deniability.
      • c-hendricks8 hours ago
        Yeah I got a kick out of that. &quot;We might have fixed your issue, if we didn&#x27;t, open a new one because we took so long acknowledging this one&quot;.
        • OptionOfT5 hours ago
          Or 3 years later: can you verify this is still needed.<p>Why on earth did I spend time in creating a reproducible example?
    • jonathaneunice13 hours ago
      &gt; I was pretty appalled to see such a basic mistake from a security company, but then again it is Okta.<p>Oh. Em. Gee.<p>Is this a common take on Okta? The article and comments suggest...maybe? That is frightening considering how many customers depend on Okta and Auth0.
      • parliament3213 hours ago
        We evaluated them a while ago but concluded it was amateur-hour all the way down. They seem to be one of those classic tech companies where 90% of resources go to sales&#x2F;marketing, and engineering remains &quot;minimum viable&quot; hoping they get an exit before anyone notices.
        • kenhwang13 hours ago
          I&#x27;m convinced Okta&#x27;s entire business model is undercutting everyone with a worse product with worse engineering that checks more boxes on the feature page, knowing IT procurement people aren&#x27;t technical and think more checkboxes means it&#x27;s better.
          • ecshafer4 hours ago
            &quot;Enterprise Software&quot; is what Tobi Lutke called that in a keynote once. A focus on hitting as many feature checkboxes as possible at the cost of quality.
      • lq9AJ8yrfs9 hours ago
        Among the reasons to leave my last job was a CISO and his minion who insisted spending $50k+ on Okta for their b2b customer and employee authentication was a bulletproof move.<p>When I brought it up, they said they didn&#x27;t have anyone smart enough to host an identity solution.<p>They didn&#x27;t have anyone smart enough to use Okta either. I had caught multiple dealbreakers-for-me such dubious &#x2F; conflicting config settings resulting in exposures, actual outages caused by forced upgrades, not to mention their lackluster responses to bona fide incidents over the years.<p>I use Authentik for SSO in my homelab, fwiw.
        • ecshafer4 hours ago
          Keycloak is a great authentication suite, not that hard to configure and rock solid.<p>Ill never understand this thinking.
          • solatic1 hour ago
            Auth providers are among the hardest systems to secure. It&#x27;s not just a question of the underlying code having vulnerabilities - for companies with Internet logins, auth systems (a) are exposed to the internet, (b) are not cache-friendly static content, (c) come under heavy expected load, both malicious (the DDoS kind) and non-malicious (the viral product launch kind), (d) if they ever go down, the rest of the system is offline (failsafe closed).<p>It&#x27;s hardly surprising that the market prefers to offload that responsibility to players it thinks it can trust, who operate at a scale where concerns about high traffic go away.
          • mmsc4 hours ago
            Keycloak has various vulnerabilities they haven&#x27;t even responded to after a month of reporting them.
            • nh23 hours ago
              Disclose publicly then, if you haven&#x27;t already?<p>Definitely makes things safer than users not knowing about them.
      • Y_Y12 hours ago
        Okta sucks balls. That&#x27;s from my perspective as a poor sod who&#x27;s responsible for some sliver of security at this S&amp;P listed megacorp that makes its purchasing decisions based on golf partners.
      • swiftcoder11 hours ago
        Yeah, I have the misfortune of inheriting a SaaS that built on auth0, and the whole stack is rather clownish. But they tick all the regulatory boxes, so we&#x27;re probably stuck with them (until they suffer a newsworthy breach, at any rate...)
        • inkyoto5 hours ago
          Okta and auth0 are, fundamentally, two distinct products – conceived, designed, and engineered by entirely separate entities.<p>auth0, as a product, distinguished itself with a modern, streamlined architecture and a commendable focus on developer experience. As an organisation, auth0 further cemented its reputation through the publication of a consistently high-calibre technical blog. Its content goes deeply into advanced subjects such as fine-grained API access control via OIDC scopes, RBAC, ABAC and LBAC models – a level of discourse rare amongst vendors in this space.<p>It was, therefore, something of a jolt – though in retrospect, not entirely unexpected – when Okta acquired auth0 in 2021. Whether this move was intended to subsume a superior product under the mediocrity of its own offering or to force a consolidation of the two remains speculative. As for the fate of the auth0 product itself, I must admit I am not in possession of definitive information – though history offers little comfort when innovation is placed under the heel of corporate, IPO driven strategy.
          • hexbin0101 hour ago
            Auth0 spent more time documenting and blogging about standards than documenting their own software. It was a bit bizarre. Their documentation was absent and or terrible IIRC
      • SAI_Peregrinus12 hours ago
        Yep. They&#x27;re an Enterprise™ company. That means they prioritize features purchasing departments want, not functionality.
      • hi_hi11 hours ago
        We&#x27;ve recently moved to Auth0. I&#x27;m no security expert. Whats the recommended alternative that provides the same features and price, but without the risks suggested here?
        • mooreds9 hours ago
          Heya, I work for FusionAuth. We have a comparable product for many use cases.<p>Happy to chat (email in profile), or you can visit our comparison page[0] or detailed technical migration guide[1].<p>0: <a href="https:&#x2F;&#x2F;fusionauth.io&#x2F;compare&#x2F;fusionauth-vs-auth0" rel="nofollow">https:&#x2F;&#x2F;fusionauth.io&#x2F;compare&#x2F;fusionauth-vs-auth0</a><p>1: <a href="https:&#x2F;&#x2F;fusionauth.io&#x2F;docs&#x2F;lifecycle&#x2F;migrate-users&#x2F;provider-specific&#x2F;auth0" rel="nofollow">https:&#x2F;&#x2F;fusionauth.io&#x2F;docs&#x2F;lifecycle&#x2F;migrate-users&#x2F;provider-...</a>
        • Exoristos10 hours ago
          It&#x27;s not difficult to implement OAuth2. There are good libraries, and even the spec is not complicated. Or use AWS Cognito.
          • inkyoto3 hours ago
            Constructing a new OAuth2&#x2F;OIDC Identity Provider from the ground up is an undertaking fraught with complexity – and not of the elegant variety. The reasons are numerous, entrenched, and maddeningly persistent.<p>1. OAuth2 and OIDC are inherently intricate and alarmingly brittle – the specifications, whilst theoretically robust, leave sufficient ambiguity to spawn implementation chaos.<p>2. The proliferation of standards results in the absence of any true standard – token formats and claim structures vary so wildly that the notion of consistency becomes a farce – a case study in design by committee with no enforcement mechanism.<p>3. ID tokens and claims lack uniformity across providers – interoperability, far from being an achievable objective, has become an exercise in futility. Every integration must contend with the peculiarities – or outright misbehaviours – of each vendor’s interpretation of the protocol. What ought to be a cohesive interface degenerates into a swamp of bespoke accommodations.<p>4. There is no consensus on data placement – some providers, either out of ignorance or expedience, attempt to embed excessive user and group metadata within query string parameters – a mechanism limited to roughly 2k characters. The technically rational alternative – the UserInfo endpoint – is inconsistently implemented or left out entirely, rendering the most obvious solution functionally unreliable.<p>Each of these deficiencies necessitates a separate layer of abstraction – a bespoke «adapter» for every Identity Provider, capable of interpreting token formats, claim nomenclature, pagination models, directory synchronisation behaviour, and the inevitable, undocumented bugs. Such adapters must then be ceaselessly maintained, as vendors alter behaviour, break compatibility, or introduce yet another poorly thought-out feature under the guise of progress.<p>All of this – the mess, the madness, and the maintenance burden – is exhaustively documented[0]. A resource, I might add, that reads less like a standard and more like a survival manual.<p>[0] <a href="https:&#x2F;&#x2F;www.pomerium.com&#x2F;blog&#x2F;5-lessons-learned-connecting-every-idp-to-oidc" rel="nofollow">https:&#x2F;&#x2F;www.pomerium.com&#x2F;blog&#x2F;5-lessons-learned-connecting-e...</a>
            • Exoristos1 hour ago
              None of this rings true, and I&#x27;ve implemented both OAuth2 and OpenID Connect multiple times, also reading the specs, which are quite direct. I&#x27;m sure you&#x27;re right that vendors take liberties -- that is almost always the case, and delinquency of e.g. Okta is what started this thread.
              • porker1 hour ago
                It&#x27;s an AI bot. One for @dang
                • inkyoto7 minutes ago
                  By the same token, if one can use the keyboard, it does not make them a human. Parrots (the non-stochastic kind) and monkeys spring to mind.
        • grinich9 hours ago
          If you’re looking for b2b identity, I’m the founder of WorkOS and we power this for a bunch of apps. Feel free to email me, mg@workos.com
          • catlifeonmars6 hours ago
            We use WorkOS to support some of our offerings but not for our own corporate identity&#x2F;authentication. I’m not close to the project so I don’t have experience using WorkOS but definitely curious about replacing Okta.
      • pm909 hours ago
        okta is the worst. Their support is the worst (we always got someone overseas who only seemed to understand anything, probably they were trained on some corpus) and would take forever to loop in anyone that could actually help.
      • rozap3 hours ago
        Yea auth0 is an absolute clown show.
  • Yasuraka13 hours ago
    Okta is, if you may excuse my French, straight garbage.
    • altairprime13 hours ago
      And too bad for everyone who was using their former competitor Auth0.
      • torton5 hours ago
        I had a fairly fun time using Auth0 a few years back. The ability to run arbitrary code hooks at various points allowed us to do pretty interesting stuff in a managed way without resorting to writing or self-hosting something that was entirely flexible.
    • sbmthakur13 hours ago
      Why if I may ask?
      • Yasuraka2 hours ago
        Security and safety is all over their marketing but I have yet to hear anything about them that doesn&#x27;t indicate either bumbling incompetence or gross negligence.
      • Hnrobert427 hours ago
        It&#x27;s a fair question. I found them way better to implement SSO in my small startup than OneLogin.<p>Using Auth0 in apps, I find their documentation bafflingly difficult to read. It&#x27;s not like being thrown in the deep end unexpected to swim. It&#x27;s like being injected at the bottom of the deep end.God help the poor non-native English speakers on my team who have to slog through it.
  • hypeatei13 hours ago
    I think GitHub should allow disabling PRs. I don&#x27;t believe most big corporations are interested in dealing with fly-by contributions because it might make them look bad or be riddled with quality issues.<p>Also some projects like the Linux kernel are just mirrors and would be better off with that functionality disabled.
    • jchw13 hours ago
      While that is true, I feel like it is irrelevant here since it seems like Okta definitely wants (and perhaps <i>needs</i>) the fixes. God only knows why GitHub still forces it on though. Early on it might&#x27;ve been some mechanism to encourage people to accept contributions to push the social coding aspect, but at this point I have no idea who this benefits, it mostly confuses people when a project doesn&#x27;t accept PRs.
      • hypeatei13 hours ago
        &gt; Okta definitely wants (and perhaps needs) the fixes<p>They definitely don&#x27;t want them if their process requires signed commits and their solution is 1) open another PR with the authors info then sign it for them, and 2) add AI into the mix because git is too hard I guess?<p>No matter how you slice it, it doesn&#x27;t seem like there are Okta employees who <i>want</i> to be taking changes from third parties.
        • jchw8 hours ago
          I think that they absolutely still want the free labor. All of those signals just suggest that they&#x27;re not willing to reciprocate any effort that you put in when you contribute.
      • petre13 hours ago
        Social on today&#x27;s Internet = bots and occasionally trolls
    • mananaysiempre13 hours ago
      GitHub actually can natively mark a repo as a mirror (or could? I can’t find an example now, but they have always been rare). The book-with-bookmark icon before “user &#x2F; repo” in the page header is replaced by a mirror-and-reflection-ish–looking thing, and the badge after it changes from “Public” to “Public mirror”. Unfortunately, forcing you into “social coding” (wait, is that no longer on the homepage?) takes priority, so that mark can only be given out by GitHub staff through manual intervention, and it doesn’t often happen.
    • terminalbraid11 hours ago
      Maybe the community should use less of github if github doesn&#x27;t provide features the community finds useful.
  • theoldgreybeard13 hours ago
    You couldn&#x27;t pay me a billion dollars to use Okta.
    • pphysch13 hours ago
      Sadly many people will spend a million dollars to use Okta for their 10,000 logins&#x2F;day (read: &lt;1 tps) instead of running their own Keycloak or Authentik or whatever.<p>OIDC is not scary, and advanced central authorization features (beyond group memberships) are a big ole YAGNI &#x2F; complexity trap.
      • p_ing12 hours ago
        Running your own local AuthN&#x2F;AuthZ is more than just &#x27;install it on a box in the closet&#x27;. I don&#x27;t blame anyone for letting one of the giants do this on their behalf -- they have the expertise, though I agree I wouldn&#x27;t touch Okta.
        • kondro7 hours ago
          Running your own AuthN&#x2F;AuthZ with an off-the-shelf OSS is very straight-forward (as a SaaS product at least) and isn&#x27;t any more burdensome from a security perspective than what you&#x27;re already doing for your core service.<p>This isn&#x27;t email.
          • p_ing7 hours ago
            Running Active Directory is as easy as it gets. Protecting the Golden Ticket is not.
        • pphysch11 hours ago
          For your average enterprise it really is that simple. Register some IDPs. Connect a backend. Add some clients over time.<p>Yes, you need someone to wear the IAM admin hat. But once you get it configured and running it requires 0.1 FTE or less (likely identical to whatever your Okta admin would be). Not worth 6+ figures a year and exposure to Okta breach risk.
          • p_ing8 hours ago
            No, it isn&#x27;t &quot;simple&quot;. Protecting your IdP is critical and not easy.<p>Yes, creating a SAML integration is easy, but that&#x27;s only one piece of the puzzle.
            • pphysch7 hours ago
              Paying Azure a little bit to run an AD instance for you, IF you need to run your own IDP (a big if), is not a bad play and does not prevent you from saving lots of money by not using a dubious product like Okta.
      • trollbridge12 hours ago
        The workload to run Authentik locally is about identical to the workload to set up and configure Okta. (Or you could just fine someone who will host Authentik for you, if deploying a container is too hard for you.)
    • mrcwinn12 hours ago
      You just literally saved me one billion dollars. The offer was incoming!
  • DrammBA11 hours ago
    I find it funny that this seemingly fictitious person Simen A. W. Olsen my@simen.io will forever be engraved as a co-author of a one-line change in the nextjs-auth0 repo.
    • letmetweakit10 hours ago
      <a href="https:&#x2F;&#x2F;who.is&#x2F;whois&#x2F;simen.io" rel="nofollow">https:&#x2F;&#x2F;who.is&#x2F;whois&#x2F;simen.io</a><p>He&#x27;s not fictitious I think.
      • syncsynchalt7 hours ago
        Simen Olsen is not fictitious, but the &quot;my@&quot; email&#x2F;username seems to be. Zero hits on DDG, and only this article comes up in Google Search.
        • verdverm1 hour ago
          Search has become so bad that zero hits is not the indicator it used to be, even DDG is struggling now.<p>It&#x27;s really evident in situations like this where you are looking for something specific. Seems like they all pushed too hard on the AI and the results are for averaged search queries. Using quotes and -term have become less helpful<p>Conspiratorially, I wonder if this is intentional to drive more traffic to ai. I find myself using Google Deep Search more, which is honestly a better UX if it would stop writing damn reports and just give me a brief with links. Alas it ignores any instructions to change it&#x27;s output format
  • deepsun8 hours ago
    Okta requiring to create a video for a pretty obvious vulnerability shows that Okta does not take security seriously, contrary to what they say at their earnings calls. Sounds like deceiving their investors.
  • filearts12 hours ago
    I think it is distasteful and disrespectful to call out an employee by name in this way, regardless of the merit of the rest of the OP&#x27;s post.
    • iloveplants12 hours ago
      well, it was distasteful of to them to close op&#x27;s pr and apply the same patch with improper attribution, and then use ai to respond when they were asked about it
      • atonse11 hours ago
        I agree with the parent post that it&#x27;s distasteful.<p>There&#x27;s no value in naming the employee. Whatever that employee did, if the company needed to figure out who it was, they can from the commit hashes, etc. But there&#x27;s no value in the public knowing the employee&#x27;s name.<p>Remember that if someone Googles this person for a newer job, it might show up. This is the sort of stuff that can disproportionately harm that person&#x27;s ability to get a job in the future, even if they made a small mistake (they even apologized for it and was open about what caused it).<p>So no, it&#x27;s completely unnecessary and irrelevant to the post.
        • Freak_NL10 hours ago
          &gt; Remember that if someone Googles this person for a newer job, it might show up.<p>Not to sound too harsh, but this is a person who rudely let AI perform a task badly which should have been handled by just… merging&#x2F;rebasing the PR after confirming it does what it should do, <i>then</i> couldn&#x27;t be bothered to reply and instead let the robot handle it, and <i>then</i> refused to fix the mess they made (making the apology void).<p>That&#x27;s three strikes.
          • abraae10 hours ago
            What if it&#x27;s some junior given a job beyond their abilities, and struggling manfully using whatever tools they have to hand. Is it worth publicly trashing their name? What does their name really add to this article?
            • jabwd5 hours ago
              A good lesson. If you as an employer look at this history, and handle it in the interview appropriately (what did you learn &#x2F; do better now for example) you can figure out if they did.<p>I&#x27;m sure lots won&#x27;t, but if that is you as an employer you&#x27;re worth nothing.
          • technion10 hours ago
            I agree what occurred is quite egregious. But &quot;use ai to talk to customers&quot; and &quot;play games with signed commits&quot; sound much more like corporate policy than one employees mistake.
        • mmsc6 hours ago
          Why would the company need to figure it out from commit hashes? It&#x27;s all public, in public GitHub repositories, with the person&#x27;s personal GitHub account: <a href="https:&#x2F;&#x2F;github.com&#x2F;auth0&#x2F;nextjs-auth0&#x2F;pull&#x2F;2381" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;auth0&#x2F;nextjs-auth0&#x2F;pull&#x2F;2381</a>
        • Exoristos10 hours ago
          &gt; This is the sort of stuff that can disproportionately harm that person&#x27;s ability to get a job in the future.<p>Isn&#x27;t that beneficial in this case?
        • parliament3210 hours ago
          &gt; Remember that if someone Googles this person for a newer job, it might show up.<p>That&#x27;s the whole point; I sincerely hope it does. Why would anyone want to hire someone that delegates their core job to a slop generator?
    • mmsc6 hours ago
      (op here)<p>On the one hand, you&#x27;re right, it is distasteful, I completely agree. On the other hand, GitHub and Google and the public domain internet isn&#x27;t everybody&#x27;s CV that they can pick and choose which of their actions are publicised, tailored towards only their successes.
    • abigail954 hours ago
      How can it ever be disrespectful to publish truthful information about someone.<p>What does respect mean and how was it violated by this post?<p>I think you are far outside the mainstream of journalism norms and ethics and as such should bear the burden of explaining yourself further.<p>I think you&#x27;re the one being disrespectful.
    • DrammBA11 hours ago
      I don&#x27;t think it is distasteful or disrespectful, he&#x27;s just explaining what happened and why, and he&#x27;s obviously unhappy with the whole ordeal.
    • merrvk10 hours ago
      They maintain a public repo.
      • nstart7 hours ago
        Yea. I can see what the parent is getting at. However the linked PR&#x27;s contain the employee name. Their username is the same name mentioned in the article. So it would have been the same even if the author had just mentioned the username instead (which would be completely acceptable in all cases). I think junior employee or not, it&#x27;s clear that they have the autonomy to check a PR for errors and fix it. So it&#x27;s very much on them.
  • rcleveng13 hours ago
    Honestly when I saw Okta in the headline, I had assumed the article was going to say they were breached again.<p>This one is amusing, and as another comment mentioned below, large companies are <i>awful</i> at accepting patches on github. Most use one-way sync tools to push from their internal repositories to github.
  • RagnarD13 hours ago
    I&#x27;ve been quite happy with FusionAuth so far. Free to run on your own server, easy to understand and set up, easy to program against, reliable.
    • wingmanjd11 hours ago
      We&#x27;re another happy FusionAuth customer. We started with self-hosted but just moved to their hosted option this year.
  • fudged7110 hours ago
    I&#x27;m currently building on the Auth0 SaaStarter because it seemed to be the only option in the market for something with all the core features enterprises are looking for. Is there an alternative that doesn&#x27;t require building from scratch?
  • jchw13 hours ago
    IANAL but unfortunately, I think the fix itself shown here might be too simple to actually clear the bar for copyright eligibility. (And in fairness to copyright law, it is basically the only sane way to fix this.) That means that there&#x27;s probably not much you can really do, but I will say this looks fucking pathetic, Okta.
    • rikafurude2113 hours ago
      I&#x27;m more confused by the fact that the OP freely submits a PR into an open source repo but then wants to use &quot;copyright&quot; because the code he submitted ended up being used under the wrong name, which was then corrected.
      • jchw8 hours ago
        Licensing your code under open source licenses does not nullify your rights under copyright law, and the license in this case does not waive any rights to attribution.<p>It would indeed be copyright violation to improperly attribute code changes. In this case I would absolutely say a force push is warranted, especially since most projects are leaning (potentially improperly) on Git metadata in order to fulfill legal obligations. (This project is MIT-licensed, but this is <i>particularly</i> true of Apache-licensed projects, which have some obligations that are surprising to people today.) A force push is not the end of the world. You can still generally disallow it, but an egregious copyright mistake in recent history is a pretty good justification. That or, literally, revert and re-add the commit with correct attribution. If you really feel this is asking too much, can you please explain why you think it&#x27;s such a big problem? If it&#x27;s such a pain, a good rule of thumb would be to not fuck this up regularly enough that it is a major concern when you have to break the glass.
      • detaro13 hours ago
        Why is it confusing to you to expect attribution?
        • rikafurude2113 hours ago
          thats not the confusing part, its rather confusing to threaten to sue for copyright because of mistaken attirbution
          • abigail954 hours ago
            Mistaken attribution, or taking something that doesn&#x27;t belong to you and saying it belongs to someone else is a core function of copyright law and should not be confusing to anyone who has dealt with it before.<p>What is your understanding of what license and rights the author was providing them - understanding this I can figure out where you are confused.
          • cyberpunk11 hours ago
            He even asked them to force-push a new history because they got the name wrong!<p>Mistakes happen, I guess this hurts his &#x27;commits in a public repo&#x27; cv score.
          • bananadonkey3 hours ago
            I didn&#x27;t see any threat to sue. What&#x27;s your source?
  • merrvk10 hours ago
    That maintainer seems clueless
  • burnt-resistor5 hours ago
    Don&#x27;t outsource SSO to any IdMaaS. It&#x27;s too critical. And especially not to Okta.
  • dovys2 days ago
    You&#x27;re either free OSS that gets flooded with AI slop PRs to overwhelm maintainers or you&#x27;re a corporate OSS that uses AI slop to frustrate contributors. Are there any positive stories I&#x27;ve not seen?
    • manithree10 hours ago
      <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=45449348">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=45449348</a>
      • mmsc6 hours ago
        Same author, even!;)
  • twodave13 hours ago
    I LOVE LLMs as a learning tool. I HATE LLMs as a communication tool. I know, there are people with serious handicaps who benefit from LLMs in this area. If only I could talk to those people and not wade through all this other garbage.<p>Especially when the AI is being represented as a person, this to me is dishonest. Not to mention annoying, almost more-so than the number of different apps that think they are important enough to send me push notifications to fill out a survey (don’t even get me started).
    • whichquestion12 hours ago
      LLMs have definitely helped me reduce my social anxiety when writing, especially in a technical work setting. I don’t use it like the respondent in the article though, I would feel really embarassed to not edit an llm’s output to be in my own voice. But I feel it helps provide me with some structure in whatever I’m trying to write when I don’t have the mental energy or wherewithal to provide it myself.
  • Traubenfuchs13 hours ago
    Is there any non shite managed oAuth solution with a free tier available?<p>Auth0 really is super easy and comfortable to integrate and I don‘t want to run my own keycloak or whatever.
    • trollbridge12 hours ago
      Authentik?
      • Traubenfuchs12 hours ago
        &gt; Replace Okta<p>Aren&#x27;t they cheeky!<p>Thanks, I will try.
  • DetroitThrow14 hours ago
    Security companies that prioritize bugs being sold rather than be reported will eventually blow up. Good luck Okta shareholders.
  • YouAreWRONGtoo14 minutes ago
    [dead]
  • yahoozoo9 hours ago
    [dead]
  • Brian-Watkins11 hours ago
    [flagged]
  • Will-Reppeto13 hours ago
    [flagged]
    • roze_sha13 hours ago
      Is this ai generated
      • transcriptase13 hours ago
        More than likely. Look at the users most recent comment with the random “ at the end too.
  • Aldipower13 hours ago
    WTF is Okta?
    • mrweasel11 hours ago
      Basically an enterprise single sign on solution. We use it to allow staff to sign into pretty much any external service using Gsuite credentials.
    • mananaysiempre13 hours ago
      An auth integrator, a pretty notable one, mostly (originally?) OAuth I think. Multiple people calling it a trash fire here came as a surprise to me, but I defer to their experience.
      • trollbridge12 hours ago
        Okta was state of the art a decade ago.
  • avree11 hours ago
    FWIW, the employee reply (who the author is putting on blast) seems like it was written by a human, not an AI.<p>&quot;You&#x27;re absolutely right!&quot; is the Claude cliche (not a ChatGPT one) - &quot;You are absolutely correct.&quot; is not that.
    • DrammBA11 hours ago
      Directly from the employee (tusharpandey13) in the github PR:<p>&gt; Yeah, i had to manually stop it and delete the ai-generated comment.