Okta Workforce Identity Cloud
Samurai [Local] Collector | Samurai [Cloud] Collector |
---|---|
Pre-requisites
- An Okta account with administrative privileges
- Your Okta Instance
Refer to the Okta documentation Find your Okta domain to determine your Okta instance.
From the Okta admin console
Create an OAuth service app integration
Follow the Okta documentation to:
Make note of the ClientID under Client Credentials as you will need this when completing the integration in the Samurai MDR portal.
Generate a public/private key pair
Follow the Okta documentation to:
Use the following settings when completing:
- Client Authentication - Public / Private Key
- Public Key Configuration - Save Keys in Okta
- Select PEM to ensure the private keys appear in PEM format
Ensure to take note of the Private Key (copy to clipboard) as you will need this when completing the integration in the Samurai MDR portal
Grant allowed scopes
Follow the Okta documentation to:
Grant the following scope:
- okta.logs.read
Assign read-only administrator
Follow the Okta documentation to:
Complete the Okta Workforce Identity Cloud Integration
- Login to the Samurai MDR portal
- Click Telemetry and select Integrations from the main menu
- Select Create
- Locate and click Okta Workforce Identity Cloud
- Enter a Name of Integration
- Enter a Description (Optional)
- Enter your ClientID created under Create an OAuth 2.0 service app integration
- Enter your Instance this refers to your Okta domain
- Enter your PEM data by pasting your Private Key in PEM format created under Generate a public/private key pair
- Click Finish
Our Integration guide was accurate at the time of writing but vendors change things frequently! If you find errors or anything is outdated, let us know by raising a request in the Samurai MDR application and we shall get it updated.