Okta incident

Customer may notice Okta LDAPi issues in Okta Cell OK9.

Major Resolved View vendor source →
Started
Feb 04, 2026, 10:41 AM UTC
Resolved
Feb 11, 2026, 06:45 PM UTC
Duration
7d 8h
Detected by Pingoru
Feb 04, 2026, 10:41 AM UTC

Affected components

okta.com cell 9Core Platform

Update timeline

  1. resolved Feb 04, 2026, 10:41 AM UTC

    At 04/02/2026 02:41 PT, the team became aware of an issue with to our service affecting customers in EMEA Cell 9. During this time, users may be experiencing intermittent issues within our system. Our team is actively investigating this issue and to mitigate the issue. We will provide another update within the next 30 minutes, or sooner if additional information becomes available.

  2. resolved Feb 04, 2026, 12:37 PM UTC

    Okta has implemented a fix for the LDAP issue affecting the OK9 environment. We are observing signs of service recovery and confirmed improvements from customers. We will continue to monitor the situation closely to ensure full resolution. We are monitoring the situation closely and will provide further updates within the next 30 minutes.

  3. resolved Feb 04, 2026, 12:50 PM UTC

    This incident has been resolved. Internal monitoring and customer reports confirm that the LDAPi system in OK9 has fully recovered and is operating normally. We will continue to closely monitor the service to ensure stability. A full Root Cause Analysis (RCA) will be made available within 5 days. We apologize for any disruption this may have caused.

  4. resolved Feb 11, 2026, 06:45 PM UTC

    On February 4th, 2026, at 3:33 AM PT, Okta received customer reports of authentication failures within the OK9 (EMEA) cell. Customers attempting to access LDAP interface services encountered certificate validation errors related to hostname mismatches, preventing successful authentication. Root Cause Summary: The incident was triggered by a misconfiguration introduced during a scheduled update of our LDAP interface to a new configuration source on February 4th 2:24 AM PT. This update inadvertently applied an incorrect SSL certificate profile to the LDAP interface within the OK9 environment. This misconfiguration caused certificate validity errors, resulting in connection issues when attempting to use LDAP services. Remediation Steps: Once the source of the issue was identified, Okta engineering team rolled back changes at 4:07 AM PT. These actions successfully addressed the issue and restored normal operations by 4:26 AM PT. Preventative Actions: To prevent future incidents, Okta has updated synthetic tests and enhanced monitoring. Teams also plan to add new tooling to improve changes to the LDAP service certificates. In addition, we are reviewing our internal processes and procedures, refining our automated rollback processes to further reduce the customer impact time for similar issues in the future. Duration (# of minutes): Total Duration (Minutes): 122 minutes Actual Time: 02:24 AM PT - 04:26 AM PT

Looking to track Okta downtime and outages?

Pingoru polls Okta's status page every 5 minutes and alerts you the moment it reports an issue — before your customers do.

  • Real-time alerts when Okta reports an incident
  • Email, Slack, Discord, Microsoft Teams, and webhook notifications
  • Track Okta alongside 5,000+ providers in one dashboard
  • Component-level filtering
  • Notification groups + maintenance calendar
Start monitoring Okta for free

5 free monitors · No credit card required