Skip to main content

Configure Okta

Okta is a platform in the Identity-as-a-Service (IDaaS) category, which allows users within an organization to access the approved software with just one login. You can integrate Compromised Credential Management (CCM) with Okta to gain actionable threat insights on compromised credentials.

Create an Okta Instance

You can create an Okta instance to gather insights on compromised credentials by flagging those at risk for remediation.

Before you Start

Ensure that you have the API token to authenticate with Okta.

Steps

To create an Okta instance, follow these steps:

  1. Access CCM and click Manage Apps.

  2. From the App Store, choose Okta and click Install.

  3. After installing the app, create an instance by clicking on Configure.

  4. To add an instance, use the following information:

    • Instance Name (Required): Enter a unique name for the Okta instance.

    • Instance Description: Enter the description for the instance.

    • Expiry: Choose the expiration period for the instance. After the expiration period, the app stops working.

    • Set as default instance: Select this to set this instance as the default instance to gather threat insights using this app. By default, this is not selected.

      Note

      If there are no existing instances, then the instance you create will be added as the default instance.

    • Base URL (Required): Enter the base URL to access Okta.

    • API Token (Required): Enter the API token to authenticate with Okta.

    • Timeout: Enter the timeout value in seconds. This is the number of seconds that requests will wait to establish a connection with Okta. The allowed range is 15-120. By default, the timeout value is set to 15.

    • Verify: Select this to verify SSL or TLS when making requests. It is recommended to enable this option. Not selecting it may lead to connection issues. By default, verification is not enabled.

  5. To save the configuration and add the instance, click Add Instance.

After you add the instance, it monitors your company’s credentials and flags any credentials that remain compromised, enabling you to take quick action.

Supported Action

The following action is supported within the Okta app to gain threat insights:

Action Name

Description

List Users With Filter

This action lists all users that match the filter criteria.

View Threat Insights

After adding an Okta instance, you can access Threat Insights on the Dashboard to correlate compromised credentials with user accounts, identify high-risk accounts, and prioritize actions effectively. For more information, see View Threat Insights.