Okta Activity Logs

The Emanate Security Platform supports direct log ingestion and user directory ingestion from Okta

Overview

Emanate uses two methods for ingesting logs and directory records.

  1. Data Retrieval APIs: Periodic (scheduled) and on-demand requests for data originating in the Emanate platform set to pull information from Okta.

  2. Event Hooks: Real time outbound calls from Okta, sent when specified events occur in your org.

Data Retrieval Configuration

Okta offers an API endpoint that allows external services to request tenant information from Okta.

Access Setup

Log in to the Okta console and Browse to the Security > API section of the User Interface.

Under Authorized Servers, click Add Authorization Server and fill out the form.

  • Name: Emanate Security API Access

  • Audience: api://default

  • Description: Readable description referring to this as the access point for Emanate Security Services

Save the form

Provide the configured information to Emanate Security

Provide the “Issuer URI” value to Emanate Security

  • The API URL has a client specific sub-domain that must be provided to Emanate. The API endpoint url after the domain is fixed.

  • Example Issuer URI: https://dev-51174099.okta.com/oauth2/default

  • Example Okta API url: https://dev-51174099.okta.com/api/v1/users

Generate an Authentication Token

To generate a new persistent token to enable access, browse to the Security > API page and then the Tokens tab.

Click the Create Token button.

  • Name the token something descriptive to its purpose, such as Emanate Access Token, click ok.

  • Copy the resulting Token Value by clicking the copy button. Provide this token value to Emanate to use for access. Click ok to close the window.

If the token value is not copied at this point, it cannot be retrieved later. If not copied, you will need to repeat the process to generate a new token. The token value is not the same as the Token ID displayed on the page.

Verify the Token

Verify the token is listed as Active with a green lit icon on the Tokens screen or click the Edit Token icon and verify the token is listed as Active just under the token name in the resulting page.

The token will stay active as long as it is used within a 30-day period and is not manually deactivated by the client. If either of these conditions change, the token becomes invalid, and Emanate systems will not be able to access the API.

By default, the new token is granted access to the Okta API for Users, Logs, Groups, and User authentication processing. No additional scopes are needed for standard Emanate processing.

User Profile Format Alignment

Okta supports a simple “Base” set of user profile attributes, but your organization may have added some custom attributes that you'd like to ingest into Emanate. If custom user fields have been added that are required for Emanate to retrieve and store, it is helpful for clients to provide an example to streamline the mapping process.

To retrieve the user profile format, navigate to the Directory > Profile Editor page.

  • Select the User Type that will be applicable for Emanate user profile information. This is typically the OKTA User (default) profile type.

  • Go to the Attributes list on the Profile Editor page.

  • Select the All option in the filters to view all attributes configured within the profile.

  • Copy all of the resulting elements from the page to a document or spreadsheet and provide to your Emanate Security representative.

Unfortunately, at present time Okta does not provide an export function, so this is a manual copy/paste process.

Once completing the above steps, and providing the necessary information to your Emanate Security representative, you have finished the API Pull Request setup. Please move on to the Event Hook configuration.

Event Hook Configuration

Okta's Event hooks to ingest security events captured by Okta. Event hooks take the form of HTTPS REST calls to a URL you specify, encapsulating information about the events in JSON objects in the request body.

How to Integrate Okta with Emanate Security

Okta supports a ‘push’ mechanism to publish/push event logs to an HTTP endpoint. In order to configure your Okta environment to send these events to the Emanate Security Platform, please follow the below steps:

Step 1: Navigating Okta

Login to the Okta Administrative Interface.

Navigate to Workflow -> Event Hooks

Step 2: Create an Event Hook

Click ‘Create Event Hook’

Enter the required values according to the below instructions:

  1. Name: Select a friendly & recognizable name for this integration. Something like Emanate Security Event Stream usually works well.

  2. URL: Enter the following URL for the Emanate Security Platform API Gateway. This is the endpoint that will receive the Okta event logs.

https://d3dlqy67b9.execute-api.us-west-2.amazonaws.com/v1/okta
  1. Custom Header Fields: Within Custom header fields, create a field titled tenant_UUID. Contact your Emanate Security Account Representative for the tenant_UUID value that corresponds to your Emanate Security Subscription.

Step 3: Add Event Subscriptions

In the Subscribe to events section, add the following events:

  • Authentication of user via MFA

  • User sign in attempt

  • A User's admin privileged changed

  • User's MFA factor activated

  • User's MFA factor updated

  • User's MFA factor deactivated

These events will support Emanate Security's complete library of automated response functions. In order to support future automations, additional event subscriptions may be needed.

Select Save & Continue

Step 4: Verify Ownership

Select the Verify button to complete your integration.

If the APIGW integration is setup correctly, Okta will now start pushing the specified events to your account in the Emanate Security Platform.

Questions

Please email any questions to support@emanatesecurity.com

Last updated