
Protect Sessions with Continuous Evaluation
Extend security beyond authentication with ITP by implementing continuous evaluation that adapts to session context changes.
Modern threats don’t stop at the login screen—neither should your defenses.
This learning path helps you move from reactive, point-in-time security to a proactive, continuous protection model.
Start with Okta Identity Threat Protection (ITP)’s core architecture, explore how session and user context are monitored in real time, and finish with policy configuration for dynamic threat response.
- Navigate ITP's five core components and risk model integration.
- List session context changes that trigger continuous evaluation.
- Distinguish the three session protection modes and their behaviors.
- Configure enforcement actions that respond to policy violations.
- Validate policy effectiveness through system log monitoring and testing.