• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News, Unified Communications

Zoom Users Can Now Use Okta to Authenticate Identity of Attendees

Okta for E2EE in Zoom allows users to authenticate a meeting attendee’s identity by email in end-to-end encrypted meetings.

March 29, 2023 Zachary Comeau Leave a Comment

Zoom Okta E2EE
Courtesy/Zoom

Users with paid Zoom accounts can now authenticate the identity of meeting attendees in end-to-end encrypted meeting with Okta Authentication for E2EE.

The feature essentially allows Zoom users to leverage the identity and access management technology from Okta to authenticate a meeting attendee’s identity by email in end-to-end encrypted (E2EE) meetings.

According to Zoom, users will know when a meeting attendee is authenticated when a blue shield appears next to their name in the meeting participant list. Other attendees can hover over the icon to see a pop-up window that displays authenticated information about that person, including their company domain and corresponding Okta-verified email address. Users can then use that information to verify that it matches the person they were expecting.

Aurora Brigham, Zoom’s lead product manager for privacy, says in a blog that Okta has become a core component of a modern zero trust approach.

“By weaving its technology into E2EE meetings, Zoom is striving to add an extra layer of security to virtual communication while maintaining our seamless and consistent experience,” Brigham says.

According to Brigham’s blog, Okta Authentication for E2EE in Zoom can be enabled by account administrators in the security tab of the Zoom web portal. Admins also need to download the Zoom E2E app from Okta and enable the feature flag called Okta Authentication for Zoom E2E Encryption, the company says.

Once the feature is turned on, a user can choose to enable the sharing of their identity in E2EE meetings by turning it on in settings. Depending on a user’s settings, they may get authenticated automatically or redirected to the Okta webpage to finish authentication with their credentials for two-factor authentication.

Once an attendee is authenticated, the blue shield will give other participants reassurance that the person they’re communicating with is the right person.

Brigham says this can help cut back on the toggle tax, which is defined as the time wasted by switching between apps to get work done.

“With Okta’s robust identity technology available right in your meeting, you can focus on meaningful communication without having to sacrifice effective security,” Brigham writes. “That way, you get to work when and where you want, all while keeping your information safe.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Identity Management, Okta, Unified Communications and Collaboration, Zoom

Related Content:

  • Cisco Live 2023 Cisco Live 2023: Simplified Management, Enhanced Security, AI
  • Phishing, Email security Email Attacks are Evading Security Protections. Here’s How…
  • MOVEit, ransomware, CVE-2023-34362, Ransomware Groups Confirmed to be Exploiting MOVEit Bug
  • Shure Stem Ecosystem Shure: Democratizing Conferencing Hardware With The Stem Ecosystem

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

ChatGPT, generative AI, enterprise, workplace
Blueprint Series: ChatGPT and Generative AI in the Workplace

This latest release of the TechDecisions Blueprint Series explores the new phenomenon of tools such as ChatGPT and how IT leaders should go about d...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.