Okta
Overview
Okta is a cloud-based identity and access management (IAM) platform that provides single sign-on (SSO), multi-factor authentication (MFA), user lifecycle management, and application access control. The Axonius Okta adapter enables visibility into Okta users, groups, roles, applications, and related identity configurations to support security posture management, access audits, and identity governance.
Use cases the adapter solves
The Okta adapter can fetch information regarding enrolled users and their registered applications and permissions. This can be used for access auditing or other related controls.
Types of Assets Fetched
Devices |
Users |
Application Extensions |
Admin Managed Extensions |
User Initiated Extensions |
Application Add-On |
Roles |
Groups |
Application Settings |
Application Extension Instances |
Admin Managed Extension Instances |
User Initiated Extension Instances |
Application Add-On Instances |
Application Keys |
Activities |
SaaS Applications |
Accounts/Tenants |
Alerts/Incidents |
Application Resources |
Permissions
Data Retrieved from Okta
- Devices: Device ID, device type, OS details, compliance status, last sign-in, associated user information.
- Users: Username, display name, email, status (active/inactive/deprovisioned), group memberships, role assignments, authentication factors, MFA enrollment, last login, custom attributes, profile information.
- Groups: Group metadata, memberships, group type (Okta-managed, imported, dynamic), assigned applications, rules and policies.
- Applications and Extensions: Assigned applications, application settings, extensions, add-ons, application resources, permissions, keys, OAuth grants, SSO configurations.
- Roles and Permissions: Role definitions, role assignments, administrative roles, permissions per role, access scopes.
- Audit and Activity Logs: User activity, authentication events, session events, administrative changes, security events, API access logs, system logs.
- Configurations and Policies: Authentication policies, sign-on policies, MFA settings, organization-wide settings, notification settings, security rules.
- General Fields: Last login timestamp, activity logs, deprovisioned status, enriched identity metadata, real-time updates (if enabled).
Before You Begin
Authentication Methods
The Okta adapter can be connected using one of the following authentication methods:
- API Key – Recommended for standard read-only connections.
- OAuth2 – Recommended for secure delegated access, supporting public/private key authentication.
Required Permissions
- Read-Only Administrator
okta.users.readokta.groups.readokta.apps.readokta.roles.readokta.logs.readokta.devices.read
More Information About This Adapter
Updated 12 days ago
