본문으로 건너뛰기

Okta Identity Integration

Overview

Okta provides cloud-based identity and access management with single sign-on, MFA, and lifecycle management. KYRA MDR collects Okta system logs via the Events API for identity threat detection and access monitoring.

Prerequisites

  • A KYRA MDR Collector installed and running
  • Okta organization with administrative access
  • API token with Read-only Admin or higher privileges
  • Okta production tenant

Configuration

Configure Okta log collection:

  1. Log in to the Okta Admin Console
  2. Navigate to Security > API > Tokens
  3. Click Create Token and name it KYRA-MDR
  4. Copy the token value (shown only once)
  5. Configure the KYRA MDR collector:
collector-config.yaml
sources:
- type: okta
domain: <your-org>.okta.com
api_token: <api-token>
poll_interval: 60s
  1. Restart the collector service

Collected Log Types

Log TypeDescriptionSecurity Use
AuthenticationUser login and MFA eventsBrute force, credential stuffing detection
AuthorizationAccess grant and deny eventsPrivilege escalation detection
User LifecycleUser creation, suspension, deletionAccount management auditing
ApplicationApplication access eventsShadow IT, unauthorized access
SystemOkta system configuration changesSecurity policy monitoring
DirectoryDirectory sync and provisioning eventsIdentity lifecycle tracking

Troubleshooting

API token expired: Okta API tokens expire after 30 days of inactivity. Generate a new token if authentication errors occur.

Rate limiting: Okta enforces API rate limits. Set the poll interval to at least 60 seconds.

Missing events: Okta system logs have a retention period based on your subscription. Poll frequently to avoid gaps.

Contact kyra@seekerslab.com for support.