TL;DR

Choosing an identity provider for a 10–50 person SMB means balancing SSO coverage, conditional access resilience, lifecycle automation, and cost. Microsoft Entra ID wins for M365-first shops with bundled licensing. Okta leads for multi-cloud environments that need a neutral, broad-integration hub. Authentik gives cost-constrained teams full control — if they can carry the operational overhead. The common thread in 2026: your IdP must defend against token theft and MFA bypass attacks that render basic MFA insufficient.​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​​‌​‍​‌‌​​​‌‌‍​‌‌​‌​​​‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌​​‌​‌‍​‌‌​​​‌‌‍​‌‌‌​‌​​‍​‌‌‌​‌​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​‌‌‌‌‍​‌‌​‌​‌‌‍​‌‌‌​‌​​‍​‌‌​​​​‌‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌‌​​‌​‍​‌‌​​​​‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​‌​‌‍​‌‌‌​‌​​‍​‌‌​‌​​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌​‌​‌‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​‌​​‍​‌‌‌​​‌​‍​‌‌​​​​‌‍​‌‌​‌‌​​‍​‌‌​‌​​‌‍​‌‌​​​​‌‍​‌‌​‌‌‌​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​


Identity is the new perimeter, and in 2026 that perimeter is under sustained attack. The Canadian Centre for Cyber Security warns that financially motivated threat actors now target enterprise identity services through vishing, credential harvesting, and supply-chain token theft rather than malware [1]. Meanwhile, device code phishing — which abuses the OAuth Device Authorization Grant to steal post-MFA session tokens — has become a commodity phishing-kit feature [2]. For Australian SMBs, the identity provider you pick is the single biggest architectural decision shaping your security posture.

This comparison covers Okta Workforce Identity, Microsoft Entra ID (P1 and P2), and Authentik (self-hosted) across the dimensions that matter to a 10–50 headcount organisation.​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​​‌​‍​‌‌​​​‌‌‍​‌‌​‌​​​‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌​​‌​‌‍​‌‌​​​‌‌‍​‌‌‌​‌​​‍​‌‌‌​‌​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​‌‌‌‌‍​‌‌​‌​‌‌‍​‌‌‌​‌​​‍​‌‌​​​​‌‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌‌​​‌​‍​‌‌​​​​‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​‌​‌‍​‌‌‌​‌​​‍​‌‌​‌​​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌​‌​‌‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​‌​​‍​‌‌‌​​‌​‍​‌‌​​​​‌‍​‌‌​‌‌​​‍​‌‌​‌​​‌‍​‌‌​​​​‌‍​‌‌​‌‌‌​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​

SSO and Protocol Coverage

All three providers support SAML 2.0 and OpenID Connect (OIDC), the two protocols that cover 95% of SaaS application integrations. The difference is breadth and depth.

Okta maintains over 7,000 pre-built application integrations with documented SAML and OIDC configurations, including Australian business tools like Xero, MYOB, Employment Hero, and SafetyCulture. SCIM 2.0 provisioning is available across the majority of these integrations, enabling automated user creation and de-provisioning at the application layer.

Microsoft Entra ID offers approximately 3,000 gallery applications and is unmatched for Microsoft 365 workloads — SharePoint, Teams, Exchange Online, and Power Platform authenticate natively against Entra without additional configuration. SCIM pro

visioning is supported for non-gallery enterprise applications, and cross-tenant synchronisation is available with P2 licensing.

Authentik supports SAML, OIDC, LDAP, and proxy-based authentication with a growing library of pre-configured providers. SCIM is available via the authentik provider model, though the integration catalogue is smaller — you will need to configure applications manually more often than with the SaaS incumbents.

Conditional Access and MFA Resilience

This is where the 2026 threat landscape reshapes priorities. The SpyCloud research on device code phishing demonstrates that attackers can obtain valid, post-MFA session tokens without ever seeing a user's password [2]. Similarly, adversary-in-the-middle frameworks like Evilginx successors capture authenticated sessions by proxying the real identity provider's login page in real time [3].

Conditional access is the primary mitigation layer beyond basic MFA.

Entra ID P2 delivers the most complete conditional access engine for the Microsoft ecosystem: device compliance checks via Intune, sign-in risk scoring from Identity Protection, impossible-travel detection, and session token binding that limits replay attacks. P1 includes the policy engine without the risk-based intelligence.

Okta provides ThreatInsight for IP reputation scoring, device trust integration across Windows, macOS, iOS, and Android, and granular network zone policies. Its FastPass passwordless authentication reduces the session-token attack surface by eliminating phishable credentials entirely.

Authentik implements stage-based flow policies — you can stack authentication stages (password, TOTP, WebAuthn), enforce IP reputation checks, and apply conditional enrollment flows. It lacks the cloud-scale threat intelligence feeds of Entra ID P2, but supports FIDO2/WebAuthn natively, which aligns with the ACSC's phishing-resistant MFA guidance.

Lifecycle Management: Joiner-Mover-Leaver

JML automation reduces the window between a staff change and access revocation — a critical gap when 65% of initial breach access now involves compromised identities [3].

Okta Lifecycle Management automates provisioning, group membership updates, and deprovisioning across connected applications. HR system integration (BambooHR, Employment Hero via API) triggers onboarding workflows.

Entra ID with P2 enables HR-driven provisioning from an authoritative source, dynamic group membership, and access reviews. For Australian SMBs already running Microsoft 365 Business Premium, JML for core workloads is largely built-in.

Authentik provides enrollment flows and lifecycle hooks, but JML automation requires more orchestration — you will likely script SCIM provisioning to downstream applications yourself. It is capable, not turnkey.

Cost and Operational Overhead

Cost per user per month (AUD, approximate, 10–50 users):

  • Okta SSO + MFA: $4–8/user/month. Full Lifecycle Management tier: $12–18/user/month.
  • Entra ID P1: $9/user/month standalone, or included in Microsoft 365 Business Premium ($33/user/month) and E3 ($55/user/month). P2 adds ~$4/user/month.
  • Authentik: $0 software licence. Infrastructure cost (VM, backups, monitoring) ~$100–$300/month total. The real cost is labour: budget 4–8 hours/month for maintenance, updates, and troubleshooting.

Operational overhead follows the inverse curve: Okta and Entra are managed SaaS with negligible infrastructure burden. Authentik requires Linux administration, PostgreSQL maintenance, certificate rotation, and disaster recovery planning. For a team without existing DevOps capability, this is the hidden cost.

Decision Matrix

Criterion Okta Entra ID P2 Authentik
SSO breadth
Conditional access
JML automation
Audit logging
Cost per user $$$ $$ (bundled) $
Operational overhead Low Low High
Australian tool coverage

Go with Entra ID if you are a Microsoft-first SMB already on Microsoft 365 Business Premium or E3. Your conditional access, device compliance, and JML tooling is largely pre-integrated. The bundled licensing makes it the lowest incremental cost option.

Go with Okta if you run a multi-cloud stack — Google Workspace plus AWS, mixed SaaS tools, no single vendor allegiance. Okta's neutral position and breadth of pre-built integrations save engineering time and reduce integration risk.

Go with Authentik if you are cost-constrained and have in-house Linux administration skills. The zero-licence model is compelling, but you must commit to the maintenance burden. Pair it with FIDO2 security keys for phishing-resistant MFA, and budget for the operational hours.


FAQ

Q: Do I actually need conditional access for a 15-person business? Yes. Device code phishing and AiTM attacks bypass MFA without triggering a credential failure. Conditional access policies that check device compliance and session risk are the primary defence against token-replay attacks in 2026 [2][3].

Q: We already have M365. Why would we pay separately for Okta? If all your critical applications live inside Microsoft 365, you probably should not. Okta earns its premium when you need a neutral IdP that integrates equally well with Google, AWS, Salesforce, and specialist SaaS tools that Entra's gallery does not cover deeply.

Q: Is self-hosting Authentik actually cheaper? On paper, yes. In practice, factor in 4–8 hours/month of system administration — updates, certificate renewal, PostgreSQL vacuuming, backup verification. If that labour costs your business more than ~$500/month in opportunity cost, Okta or bundled Entra may be cheaper in real terms.

Q: Does the ACSC Essential Eight require any of this? The Essential Eight Maturity Level Two requires multi-factor authentication for all users accessing important data, and recommends phishing-resistant MFA (FIDO2/WebAuthn) [4]. All three IdPs support this — but Entra ID P2 and Okta provide more automation for enforcing and reporting compliance.


Conclusion

Identity architecture in 2026 is not a commodity decision. The MFA bypass techniques documented by SpyCloud, the Canadian Cyber Centre, and red-team practitioners make clear that basic MFA without conditional access is a speed bump, not a wall. For Australian SMBs with 10–50 staff, the choice hinges on your existing ecosystem: Entra ID for Microsoft-first shops, Okta for multi-cloud environments, and Authentik for teams that value control over convenience.

Start with an inventory of every application your staff authenticate to. Map which support SAML or OIDC. Then match the decision matrix to your reality — not the idealised version of it.

Visit consult.lil.business for a free 30-minute identity architecture assessment tailored to your SMB's stack and budget.


References

  1. Alert AL26-010: Cyber Criminals Social-Engineering-Enabled Compromise of Enterprise SaaS Environments — Canadian Centre for Cyber Security
  2. Device Code Phishing: The AiTM Attack That Bypasses MFA — SpyCloud Labs
  3. Identity-Based Attacks in 2026: MFA Bypass, Token Theft, and the Death of Passwords — CyberSecPentesting
  4. Essential Eight Maturity Model — Australian Cyber Security Centre

TL;DR

  • Microsoft fixed 84 security problems in their software this month
  • Two bugs were especially serious because bad guys knew about them before Microsoft could fix them
  • One bug lets attackers become bosses of your database; another can crash your apps
  • You should update your Windows computers this week

Related: How AI Attacks Now Steal Your Data in 72 Minutes

What Is Patch Tuesday?

Think of Patch Tuesday like a regular check-up at the doctor, but for your computer. Every second Tuesday of the month, Microsoft releases updates that fix security problems in Windows, Office, and other Microsoft software [1].

It's called "Patch Tuesday" because Microsoft "patches" (fixes) holes that bad guys could use to break into your computer.

What Happened in March 2026

This month, Microsoft fixed 84 security problems [2]. That's a lot! Most of these are like small cracks in a wall — not super dangerous on their own, but bad if left unfixed.

Two of these problems were extra serious because bad guys already knew about them before Microsoft could fix them. These are called "zero-days" — zero days between when bad guys found out and when Microsoft could fix them [3].

The Two Big Bugs to Know About

Bug #1: The Database Boss Maker (CVE-2026-21262)

Imagine your business database is like a filing cabinet with different drawers. Most employees can only open certain drawers. The boss can open ALL the drawers.

This bug lets someone who's only supposed to open one drawer suddenly become the boss and open EVERY drawer [4].

Why it's bad: If a bad guy gets into your system (even just a tiny bit), they can use this bug to give themselves full control over your database. They could read, change, or delete your customer records, financial data, or any important information [5].

Who needs to worry: If your business uses Microsoft SQL Server (a program that stores lots of business data), you need to fix this right away.

Bug #2: The App Crasher (CVE-2026-26127)

Imagine your business has a storefront. This bug is like someone having a remote control that can shut your doors and make customers wait outside [6].

It affects programs built with .NET (a tool many businesses use to build applications). A bad guy could crash your apps from anywhere in the world, making your website or tools stop working [7].

Why it's bad: Downtime = lost money. If your online store or booking system goes down, customers can't buy from you.

Who needs to worry: If your business uses applications built with Microsoft .NET, you should update them.

Other Important Fixes

Microsoft also fixed a bug called CVE-2026-25187 that lets someone with basic access become the boss of the entire Windows computer (SYSTEM account) [8]. Think of it like an intern suddenly getting the CEO's keycard.

There's also CVE-2026-26144, which could leak information from Excel files when using Microsoft's AI helper (Copilot) [9]. If your Excel files have sensitive business info, this matters.

Why Privilege Escalation Is Like Promoting the Wrong Person

Most of the bugs fixed this month (55 out of 84!) are called "privilege escalation" [10]. That's a fancy way of saying "promoting someone to a level they shouldn't have."

Here's how it works:

  1. Bad guy gets into your system somehow (like finding an open window)
  2. Bad guy uses a privilege escalation bug (like picking a lock to get from the hallway into the CEO's office)
  3. Bad guy now has full control and can steal, delete, or ransom your data

This is why patching matters — even if you think "why would bad guys target me?" — they use automated tools to find these open doors everywhere.

What You Should Do This Week

1. Update All Windows Computers

For most Windows users, it's easy:

  1. Click Start → Settings (the gear icon)
  2. Go to "Windows Update"
  3. Click "Check for updates"
  4. Install all updates and restart when asked

This should take 10-30 minutes, depending on your computer.

2. Check With Your IT Person or Vendor

If you have someone managing your computers, ask them:

  • "Did we apply the March 2026 Microsoft security updates?"
  • "Do we use SQL Server? If so, is it patched for CVE-2026-21262?"
  • "Do we have any .NET applications? Are they updated?"

3. Back Up Important Data Before Updating

Before updating critical systems (like servers or computers that run your business):

  • Make sure your backups are recent
  • Test that you can restore from backups
  • Have a plan in case something goes wrong

It's like backing up your phone before updating iOS — just good practice.

Related: Your Backups Are Actually Working — But Ransomware Gangs Just Changed the Rules

Why This Matters for Your Business

Think of computer security like locking up your shop at night. You wouldn't leave the back door open, right?

Unpatched software is like an open door. Bad guys have automated tools that scan the internet looking for open doors. They don't care who you are — they're just looking for easy targets.

The good news: When you update regularly, you're closing those doors. Most automated attacks will move on to easier targets.

FAQ

Set a reminder for next week. Better late than never. But if your computers hold sensitive data (customer info, financial records, passwords), try to update within 7 days for the serious bugs (the two zero-days).

It's rare, but sometimes updates can cause problems. That's why big businesses test updates first. For a small business, just make sure you have backups before updating. If something breaks, you can restore.

These specific updates are for Microsoft software. If your Mac runs Microsoft Office or uses Microsoft .NET applications, you might still need to update those programs. Check with your IT person.

These updates are for computers. Phones (iPhone, Android) have their own update systems. You should update those too, but that's separate from Patch Tuesday.

Microsoft releases updates every month on Patch Tuesday (second Tuesday). Set a reminder to check updates a few days after Patch Tuesday each month. It's a good habit.


Security doesn't have to be complicated. Update regularly, back up your data, and have a plan. That's the foundation. If you want help building a security approach that fits your business, let's talk.

References

[1] Microsoft, "Windows Update Overview," Microsoft Docs, 2026. [Online]. Available: https://docs.microsoft.com/windows/deployment/update/windows-update-overview

[2] The Hacker News, "Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days," The Hacker News, 2026. [Online]. Available: https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html

[3] Malwarebytes, "What is a Zero-Day Vulnerability?" Malwarebytes Labs, 2026. [Online]. Available: https://www.malwarebytes.com/blog/news/2025/11/what-is-a-zero-day-vulnerability

[4] National Vulnerability Database, "CVE-2026-21262," NIST, 2026. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2026-21262

[5] Malwarebytes, "March 2026 Patch Tuesday fixes two zero-day vulnerabilities," Malwarebytes Blog, 2026. [Online]. Available: https://www.malwarebytes.com/blog/news/2026/03/march-2026-patch-tuesday-fixes-two-zero-day-vulnerabilities

[6] Security Boulevard, "March 2026 Patch Tuesday fixes two zero-day vulnerabilities," Security Boulevard, 2026. [Online]. Available: https://securityboulevard.com/2026/03/march-2026-patch-tuesday-fixes-two-zero-day-vulnerabilities-2/

[7] Malwarebytes, "March 2026 Patch Tuesday fixes two zero-day vulnerabilities," Malwarebytes Blog, 2026. [Online]. Available: https://www.malwarebytes.com/blog/news/2026/03/march-2026-patch-tuesday-fixes-two-zero-day-vulnerabilities

[8] The Hacker News, "Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days," The Hacker News, 2026. [Online]. Available: https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html

[9] The Hacker News, "Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days," The Hacker News, 2026. [Online]. Available: https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html

[10] Satnam Narang, "Patch Tuesday Analysis: March 2026," Tenable, 2026. [Online]. Available: https://www.tenable.com/blog/

Ready to strengthen your security?

Talk to lilMONSTER. We assess your risks, build the tools, and stay with you after the engagement ends. No clipboard-and-leave consulting.

Get a Free Consultation