It's 4:47 PM on a Friday
You're updating the MFA enrollment policy to require phishing-resistant authenticators -- a change your security team has been asking about for weeks. You review the settings, double-check the authenticator list, and click save.
Within minutes, your helpdesk lights up. Two hundred users can't log in. They haven't enrolled in FIDO2 yet, and the old authenticators are no longer accepted. Your Slack is a wall of red. The VP of Sales can't access Salesforce for a deal closing in an hour. The CEO's EA can't get into Google Workspace.
You need to roll back. But Okta doesn't have an undo button.
You scramble to remember what the policy looked like before. Was it "any two factors" or "any factor"? Which authenticators were in the list? Were there group exclusions? You open a support ticket, but Okta support can't restore your previous configuration either. It's not something they store.
This scenario plays out at companies every week. And it's entirely preventable.
The problem: Okta has no rollback
Okta is a world-class identity platform. It handles authentication for thousands of organizations, supports hundreds of integrations, and maintains excellent uptime. But when it comes to configuration management, there's a fundamental gap.
Changes are immediate and irreversible. When you modify a sign-on policy, update a group rule, or change an app assignment, the old state is gone. There's no version history. No change log you can revert to. No "undo" anywhere in the admin console.
The admin console doesn't show impact before you save. You can see what you're changing, but you can't see who will be affected. That MFA policy might apply to 50 users or 5,000 -- you won't know until the tickets start rolling in.
Most orgs discover mistakes through user complaints. Without proactive monitoring, the first signal that something went wrong is an angry message in Slack or a flood of helpdesk tickets. By then, the damage is done and the pressure is on.
The system log shows what happened, but not what was there before. Okta's system log records that a policy was updated. It does not record the previous state of that policy. You know that something changed, but not what it changed from.
What Okta admins actually need
After talking to dozens of Okta administrators, we've found the same four requests come up repeatedly:
1. Snapshot before change
Before you edit anything, capture the current state. Not a mental note. Not a screenshot. A complete, structured snapshot of the resource and everything connected to it. If the change goes wrong, you have a known-good state to return to.
2. Impact preview
Before you click save, know how many users will be affected. Which groups does this policy apply to? How many active users are in those groups? What applications depend on this sign-on policy? The admin console doesn't answer these questions. A safety net should.
3. Quick diff
After making a change, see exactly what's different between your snapshot and the current state. Field by field. Not a vague "policy was updated" log entry, but a precise comparison: this authenticator was removed, this group was added, this session lifetime changed from 8 hours to 2 hours.
4. One-click rollback
If something goes wrong, revert to the snapshot. Don't rebuild from memory. Don't guess at the previous settings. Restore the exact configuration that was working ten minutes ago.
The Butterfly Security Chrome Extension
We built a free Chrome extension that adds these capabilities directly into the Okta admin console. No separate tool to switch to. No API tokens to configure. It works with your existing admin session and augments the console you already use.
Snapshot any resource. One click to capture the current state of a user, group, policy, application, authenticator, network zone, or any of the 36+ resource types the extension supports. Snapshots are stored locally in your browser -- nothing leaves your machine unless you choose to export.
Diff against current state. Select a previous snapshot and compare it to the live configuration. The extension highlights every difference: added fields, removed values, changed settings. You see exactly what moved and when.
Built-in API Explorer. The extension includes a 727-endpoint API Explorer built from the official Okta Postman collection. Browse, search, and execute API calls directly from the side panel. No need to switch to Postman or the command line when you need to check something the admin console doesn't surface.
Beyond snapshots: the full safety net
The extension includes several additional features that make day-to-day Okta administration safer and faster:
- Identity X-Ray. Before you modify a group or policy, see all access paths that flow through it. Understand the blast radius of a change before you make it. The X-Ray traces user-to-application access paths, calculates risk scores, and flags redundant paths that might indicate over-provisioning.
- HealthInsight++. A real-time security grade for your Okta org, calculated from eight checks that go beyond what Okta's built-in HealthInsight covers. The extension adds a letter grade (A through F) visible in the admin console header, so your security posture is always in your peripheral vision.
- AI Security Advisor. Context-aware security guidance that appears directly in the admin console. When you're editing a policy, the advisor can flag common misconfigurations. When you're reviewing a user's access, it can highlight unusual patterns.
- Bulk Operations. Batch deactivate, suspend, unsuspend, or reset MFA for multiple users at once. Manage group memberships in bulk. Operations that would take dozens of clicks in the native console become a single action.
- Export Everything. CSV or JSON export from any Okta admin page. Users, groups, apps, policies, logs -- if you can see it in the console, you can export it.
- Resource Annotations. Pin colored notes to any Okta resource. Mark a group as "do not modify -- tied to production SSO" or flag a user account as "service account -- contact Platform team before changes." Notes persist across sessions and are visible whenever you view that resource.
Ready to protect your identity infrastructure?
Butterfly Security backs up identity configuration, restore readiness, and compliance evidence for the workflows teams actually rely on.
For teams that need more: the Butterfly Security platform
The Chrome extension solves the immediate problem for individual admins. For teams that need organization-wide backup, compliance scanning, and multi-provider coverage, the Butterfly Security platform provides:
- Full org backup and restore across 11 identity providers -- Okta, Entra ID, Auth0, Google Workspace, 1Password, Salesforce, and more. Automated scheduled backups capturing every resource type, with point-in-time restore and dry-run previews.
- Compliance scanning against SOC 2, HIPAA, PCI DSS, NIST 800-53, ISO 27001, and CIS Controls. Twelve checks per provider, each mapped to a specific framework control with remediation steps.
- Shared Signals Framework (SSF) integration. Receive real-time security events -- user compromised, session revoked, credential changed -- and automatically trigger snapshots. When an incident happens, you already have the data you need.
- Resilience and Security Posture dashboards that give leadership a clear picture of identity infrastructure health without needing to log into the admin console.
Get started
The Chrome extension is free. No account required. No API token needed. Install it, open the Okta admin console, and take your first snapshot.
- Read the documentation to see what the extension covers
- Try the interactive platform demo to explore backup, compliance, and restore
- Install the Chrome Extension to get started today
The undo button Okta should have built? Now you have it.
Ready to protect your identity infrastructure?
Butterfly Security backs up identity configuration, restore readiness, and compliance evidence for the workflows teams actually rely on.