Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Months of logging in without a password at Okta
2 min Security

Months of logging in without a password at Okta

Berry ZwetsNovember 4, 2024 8:46 amNovember 4, 2024
Months of logging in without a password at Okta

For three months, the identity and access management service Okta allowed users to access accounts using only a username.

The vulnerability, which has been active since July, was identified in late October. The issue was in AD/LDAP Delegated Authentication (LDAP), a protocol for accessing stored usernames, passwords, e-mail addresses, and other data within directories. Okta uses LDAP to let users log in by accessing credentials from an organization’s Active Directory or Windows networked single sign-on system.

At least 52 characters

The vulnerability allowed three months to access accounts with user names of at least 52 characters. While this is an unusually long number, it does occur in practice. It allowed access without a password in certain situations, such as agent downtime and high network traffic.

The problem occurred in the cache key generation process, in which an algorithm hashes a combination of userID, username, and password. Retaining cached keys from previous successful login sessions allowed access with a longer username, provided the authentication request was associated with a cached key from previous sessions.

The vulnerability has since been fixed using a different algorithm for the hashing process. However, Okta recommends implementing additional security measures, such as multi-factor authentication, to prevent security problems better now and in the future.

Tip: The security platform beckons: what is it and what does it provide?

Tags:

Active Directory / authentication / Login / Okta

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Traditional login with username and password disappears on Outlook

Okta hack shows how vulnerable digital authentication is

Zoom and Okta bring additional security to meetings

AuthID integrates Human Factor Authentication with Okta cloud

Editor picks

Google Cloud and Wiz build multi-cloud platform on top of Security Graph

At Google Cloud Next 2026, the message from Google Cloud and Wiz was ...

Tredence powers up Gemini-powered agentic AI accelerators

Data science platform Tredence has detailed its suite of agentic AI a...

ABBYY: AI with a purpose starts with documents

ABBYY CEO Ulf Persson has led the Document AI platform company for al...

Google presents TPU 8t and TPU 8i chips; splits training and inference

At Google Cloud Next 2026 in Las Vegas the company presents its 8th-g...

Techzine.tv

How Ansible becomes the execution layer for agentic AI

How Ansible becomes the execution layer for agentic AI

EU digital sovereignty and policy: Cisco's perspective

EU digital sovereignty and policy: Cisco's perspective

How JFrog secures binaries in the age of AI coding assistants

How JFrog secures binaries in the age of AI coding assistants

Why observability is critical for AI code generation success

Why observability is critical for AI code generation success

Read more on Security

Nextcloud ends bug bounty program due to too many low-quality reports

Nextcloud ends bug bounty program due to too many low-quality reports

Nextcloud is discontinuing its bug bounty program on HackerOne. The reason is the increasing flood of generic...

Berry Zwets 1 day ago
Microsoft is using Mythos to detect vulnerabilities

Microsoft is using Mythos to detect vulnerabilities

Microsoft is taking a step forward in the use of artificial intelligence for cybersecurity by integrating adv...

Mels Dees 11 hours ago
NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result
Top story

NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result

Attribute-based encryption at the data layer

Sander Almekinders April 15, 2026
Security by Design prevents higher bills
Top story

Security by Design prevents higher bills

Those who build in security only after the fact pay up to fifteen times the original cost. That’s why a str...

Berry Zwets April 16, 2026

Expert Talks

Anthropic’s Mythos preview: why the human layer matters more, not less

Anthropic’s Mythos preview: why the human layer matters more, not less

Anthropic has announced Anthropic’s Mythos Preview, a frontier mode...

Why SAST is growing in importance in the age of AI-generated source code

Why SAST is growing in importance in the age of AI-generated source code

Vibe coding is rising astonishingly quickly, but even developers who ...

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe, the most influential information security event...

Better connected business technology is essential for prosperity in the Netherlands 

According to PwC, the Netherlands ranks fourth in Europe for producin...

Tech calendar

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Knowledge 26

May 5, 2026 Las Vegas

GISEC GLOBAL 2026

May 5, 2026 DUBAI

Red Hat Summit

May 11, 2026 Atlanta

DevOpsCon London

May 11, 2026 London

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement