Skip to content
Techzine Europe
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Europe
  • Techzine Netherlands
Techzine News Security Months of logging in without a password at Okta
2 min Security

Months of logging in without a password at Okta

Berry ZwetsNovember 4, 2024 8:46 amNovember 4, 2024
Months of logging in without a password at Okta

For three months, the identity and access management service Okta allowed users to access accounts using only a username.

The vulnerability, which has been active since July, was identified in late October. The issue was in AD/LDAP Delegated Authentication (LDAP), a protocol for accessing stored usernames, passwords, e-mail addresses, and other data within directories. Okta uses LDAP to let users log in by accessing credentials from an organization’s Active Directory or Windows networked single sign-on system.

At least 52 characters

The vulnerability allowed three months to access accounts with user names of at least 52 characters. While this is an unusually long number, it does occur in practice. It allowed access without a password in certain situations, such as agent downtime and high network traffic.

The problem occurred in the cache key generation process, in which an algorithm hashes a combination of userID, username, and password. Retaining cached keys from previous successful login sessions allowed access with a longer username, provided the authentication request was associated with a cached key from previous sessions.

The vulnerability has since been fixed using a different algorithm for the hashing process. However, Okta recommends implementing additional security measures, such as multi-factor authentication, to prevent security problems better now and in the future.

Tip: The security platform beckons: what is it and what does it provide?

Tags:

Active Directory / authentication / Login / Okta

"*" indicates required fields

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.

Related

Traditional login with username and password disappears on Outlook

Okta hack shows how vulnerable digital authentication is

Zoom and Okta bring additional security to meetings

AuthID integrates Human Factor Authentication with Okta cloud

Editor picks

Ingram Micro slowly gets back on its feet after ransomware attack

Ingram Micro is gradually reactivating customer ordering after contai...

Domain-specific AI beats general models in business applications

Visma’s AI team is quietly redefining document processing across Eu...

The AI wave is forcing organizations to rethink their infrastructure

The rapid rise of AI is creating a new reality. Whereas infrastructur...

Docker Compose aims to make AI agent creation a breeze

Docker has expanded its Compose tool to support AI agent architecture...

Insight: Storage

It’s World Backup Day, but backups alone are not enough

It started as a Reddit post in 2011: World Backup Day. Every March 31...

Rubrik expands to AWS, Oracle Cloud Infrastructure and OpenShift

From now on, Rubrik is expanding and debuting its protection and back...

Fidelma Russo: “HPE builds and acquires what customers need within their stack”

Fidelma Russo: “HPE builds and acquires what customers need within their stack”

Russo has an eye for customers and innovations

Pure’s FlashBlade//EXA should solve storage bottlenecks in AI and HPC

Pure’s FlashBlade//EXA should solve storage bottlenecks in AI and HPC

"Storage is accelerating the pace of large-scale HPC and AI evolution."

Read more on Security

Fake software tools cost blockchain developer $500,000

Fake software tools cost blockchain developer $500,000

A Russian blockchain developer lost half a million dollars in cryptocurrency after installing a malicious ext...

Berry Zwets 5 hours ago
An average of 131 CVE reports per day

An average of 131 CVE reports per day

The number of CVE reports will continue to rise in 2025. There is now an average of 131 per day. The KEV list...

Berry Zwets 7 hours ago
Critical vulnerability in MCP highlights need for better security

Critical vulnerability in MCP highlights need for better security

The JFrog security team recently discovered a serious vulnerability in the open-source project mcp-remote. ...

Mels Dees 9 hours ago
KnowBe4 evolves from security training to human risk management
Top story

KnowBe4 evolves from security training to human risk management

Security awareness training has come a long way from its origins as a compliance checkbox. Today, it’s evol...

Berry Zwets July 11, 2025

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Tech calendar

Krijg Volledig Inzicht van Gebruiker tot Cloud met Cisco ThousandEyes

July 15, 2025

GITEX DIGI_HEALTH 5.0 - Thailand

September 10, 2025 BITEC Bangkok, Thailand

IT Arena

September 26, 2025 Lviv, Ukraine

Innovation Week 2025

October 9, 2025 Prague

Luxembourg Venture Days

October 22, 2025 Luxembourg

Appdevcon

March 10, 2026 Amsterdam

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement