Skip to content

Commit 57b4116

Browse files
Merge pull request #4692 from DeCohen/WI451232-okta-public-preview-unified-connector
new article how mdi protects okta accounts
2 parents 5faf7c4 + e154c68 commit 57b4116

11 files changed

+119
-38
lines changed

ATPDocs/alerts-xdr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.reviewer: rlitinsky
88

99
# Microsoft Defender for Identity XDR alerts
1010

11-
Microsoft Defender for Identity alerts can appear in the Microsoft Defender XDR portal in two different formats depending on if the alert originates from Defender for Identity or Defender XDR. All alerts are based on detections from Defender for Identity sensors. The differences in layout and information are part of an ongoing transition to a unified alerting experience across Microsoft Defender products. This article lists
11+
Microsoft Defender for Identity alerts can appear in the Microsoft Defender XDR portal in two different formats depending on if the alert originates from Defender for Identity or Defender XDR. All alerts are based on detections from Defender for Identity sensors. The differences in layout and information are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
1212

1313
To learn more about how to understand the structure, and common components of all Defender for Identity security alerts, see [View and manage alerts](understanding-security-alerts.md).
1414

49.4 KB
Loading
49.5 KB
Loading
36.9 KB
Loading
149 KB
Loading
34.8 KB
Loading
83.7 KB
Loading
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
title: How Microsoft Defender for Identity protects your Okta accounts
3+
description: Learn how Microsoft Defender for Identity protect your Okta accounts and what the integration enables.
4+
ms.date: 08/07/2025
5+
ms.topic: overview
6+
ms.reviewer: himanch
7+
# customer-intent: As a security administrator, I want to understand what happens when I connect Okta to Microsoft Defender for Identity, so that I can decide whether to enable the integration.
8+
---
9+
10+
# How Microsoft Defender for Identity protects your Okta accounts
11+
12+
Okta is a cloud-based identity and access management (IAM) platform that helps organizations control how users and administrators sign in and access enterprise applications. Okta manages high-value identities, including privileged accounts and API tokens. As a result, it’s a frequent target for misuse or attack. Many organizations use Okta alongside on-premises systems like Active Directory and cloud services like Microsoft Entra ID. This hybrid model can make it harder to monitor identity activity and detect threats consistently across platforms.
13+
14+
When you connect Okta to Microsoft Defender for Identity, you can extend your identity threat detection and investigation capabilities to include Okta-managed users. Defender for Identity ingests user and activity data from Okta and correlates it with identity data from Active Directory and Microsoft Entra ID. This integration gives you a centralized view of user activity, posture risks, and suspicious behavior across your identity infrastructure, and you can take the necessary remediation actions.
15+
16+
17+
> [!NOTE]
18+
> The **Identity details** page in the Microsoft Defender portal shows the **Okta user risk score** only if the **Identity Threat Protection with Okta AI** feature is enabled. For more information, see [Risk scoring (Okta Identity Engine)](https://help.okta.com/oie/en-us/content/topics/security/security_risk_scoring.htm).
19+
20+
## What you can do after connecting Okta
21+
22+
With Okta connected, Defender for Identity provides the following capabilities:
23+
24+
25+
|Capability |Description |
26+
|---------|---------|
27+
|View Okta accounts in the Identity Inventory | Defender for Identity adds Okta users to the identity inventory in the Microsoft Defender portal. These accounts correlate with matching identities from Active Directory or Microsoft Entra ID, to allow unified tracking across platforms. |
28+
|Improve Okta security posture | Defender for Identity evaluates identity configuration in Okta and surfaces posture recommendations in Microsoft Secure Score. Example recommendations include: <br> - [Assign multifactor authentication to Okta privileged user accounts](assign-multi-factor-authentication-okta-privileged-user-accounts.md) <br> - [Change password for Okta privileged user accounts](change-okta-password-privileged-user-accounts.md) <br> - [High number of Okta accounts with privileged role assigned](high-number-of-okta-accounts-with-privileged-role-assigned.md) <br> - [Highly privileged Okta API token](highly-privileged-okta-api-token.md) <br> - [Limit the number of Okta Super Admin accounts](limit-number-okta-super-admin-accounts.md) <br> - [Remove dormant Okta privileged accounts](remove-dormant-okta-privileged-accounts.md) |
29+
|Get alerts on suspicious Okta activity | Defender for Identity alerts you when it detects high-risk behavior in Okta, including anonymous sign-ins, privileged role assignments, and token abuse. These alerts are available in Microsoft Defender XDR. When connected, Defender for Identity raises the following alerts based on Okta activity: <br> - Okta anonymous user access <br> - Privileged API token created <br> - Privileged API token updated <br> - Privileged Role assignment to Application <br> - Suspicious privileged role assignment <br> For a full list of supported alerts, see: [Defender for Identity XDR alerts](/defender-for-identity/alerts-xdr#initial-access-alerts). |
30+
|Use advanced hunting to investigate Okta activity | Advanced hunting lets you investigate identity activity across different services including Okta, Active Directory, and Microsoft Entra ID. <br> The **IdentityInfo** table includes account metadata such as privilege level, group membership, and identity source. <br> The **IdentityEvents** table includes events related to those identities, such as sign-ins, authentication attempts, and identity-related alerts across supported identity providers. <br> To explore the full schema and build your own queries, see: <br> - [IdentityInfo ](/defender-xdr/advanced-hunting-identityinfo-table) <br> - [IdentityEvents(Preview)](/defender-xdr/advanced-hunting-identityevents-table). |
31+
|Take remediation actions | When Microsoft Defender for Identity identifies an identity as at risk, you can take the following remediation actions directly from the Defender portal to update the user's status in Okta. <br> - Revoke all user's sessions <br> - Deactivate user in Okta <br> - Set user risk in Okta <br> For more information, see: [Remediation actions in Microsoft Defender for Identity](remediation-actions.md#roles-and-permissions). |
32+
33+
34+
## Next steps
35+
36+
- [Connect Okta to Microsoft Defender for Identity](okta-integration.md)
37+

ATPDocs/okta-integration.md

Lines changed: 61 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,58 @@
11
---
2-
title: Microsoft Defender for Identity Okta integration |
3-
description: Learn how about connecting your Okta app to Defender for Identity using the API connector.
4-
ms.date: 05/19/2025
2+
title: Connect Okta to Microsoft Defender for Identity (Preview)
3+
description: Learn how to connect your Okta app to Defender for Identity using the API connector.
4+
ms.date: 08/07/2025
55
ms.topic: how-to
6-
ms. reviewer: izauer-bit
6+
ms. reviewer: Himanch
77
---
88

9-
# Integrate Okta with Microsoft Defender for Identity (Preview)
9+
# Connect Okta to Microsoft Defender for Identity (Preview)
1010

11-
Okta manages how users and customers sign in and get access to key systems. Since it plays a central role in identity and access management, any compromise whether accidental or intentional can lead to serious security risks. By integrating Microsoft Defender for Identity with Okta, you gain stronger identity protection. Defender for Identity monitors sign-in activity, detects unusual behavior, and highlights threats related to compromised or misused identities. It also identifies risks like suspicious role assignments or unused high-privilege accounts, using Okta data to deliver clear, actionable insights that help keep your organization secure.
11+
This page explains how to connect Microsoft Defender for Identity to your Okta account using the Unified Connectors experience. This connection provides visibility into Okta activity and enables shared data collection across Microsoft security products. The Unified Connectors experience allows Defender for Identity to collect Okta system logs once and share them with other supported Microsoft security products, such as Microsoft Sentinel. This reduces API usage, avoids duplicate data collection, and simplifies connector management. For more information, see [Unified connectors overview](/azure/sentinel/unified-connector).
12+
13+
> [!NOTE]
14+
> If your Okta environment is already integrated with [Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-okta), connecting it to Microsoft Defender for Identity can cause duplicate Okta data, such as user activity, to appear in the Defender portal.
1215
1316
## Prerequisites
1417

1518
Before connecting your Okta account to Microsoft Defender for Identity, make sure the following prerequisites are met:
1619

17-
1. Your Okta environment must have one of the following licenses:
20+
### Okta licenses
1821

19-
- Developer
22+
Your Okta environment must have one of the following licenses:
2023

21-
- Enterprise
24+
- Developer
2225

23-
> [!NOTE]
24-
> The Super Admin role is required only to create the API token. Once the token is created, remove the role and assign the Read-Only Administrator and Defender for Identity custom roles for ongoing API access.
26+
- Enterprise
2527

28+
### Okta roles
29+
30+
The Super Admin role is required only to create the API token. After you create the token, remove the role and assign the Read-Only Administrator and Defender for Identity custom roles for ongoing API access.
2631

27-
> [!NOTE]
28-
> If your Okta environment is already integrated with [Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-okta), connecting it to Microsoft Defender for Identity might cause duplicate Okta data, such as user activity, to appear in the Defender portal.
2932

33+
### Microsoft Entra and Defender XDR role-based access options
34+
To configure the Okta connector in Microsoft Defender for Identity, your account must have either of the following access configurations assigned:
35+
36+
- **Microsoft Entra roles:**
37+
38+
- Security Operator
39+
- Security Admin
40+
41+
- **Defender XDR Unified RBAC permission:**
42+
43+
- Core security settings (manage)
3044

3145
### Connect Okta to Microsoft Defender for Identity
3246

3347
This section provides instructions for connecting Microsoft Defender for Identity to your dedicated Okta account using the connector APIs. This connection gives you visibility into and control over Okta use.
3448

3549
### Create a dedicated Okta account
3650

37-
1. Create a dedicated Okta account that is used only for Microsoft Defender for Identity.
51+
1. Create a dedicated Okta account for Microsoft Defender for Identity use only.
3852
1. Assign your Okta account as a Super Admin role.
3953
1. Verify your Okta account.
4054
1. Store the account credentials for later use.
41-
1. Sign in to your dedicated Okta account created in step 1 in order to create an API token.
55+
1. Sign in to your dedicated Okta account created in step 1 to create an API token.
4256

4357
### Create an API token
4458

@@ -56,9 +70,9 @@ This section provides instructions for connecting Microsoft Defender for Identit
5670
:::image type="content" source="media/okta-integration/create-an-okta-token.png" alt-text="Screenshot of the Okta API Tokens tab with the Create token button highlighted.":::
5771

5872
1. In the Create token pop-up:
59-
1. Enter a name for your Defender for Identity token
60-
2. Select Any IP
61-
3. Select Create token.
73+
1. Enter a name for your Defender for Identity token.
74+
2. Select **Any IP**.
75+
3. Select **Create token**.
6276

6377
:::image type="content" source="media/okta-integration/enter-okta-token-details.png" alt-text="Screenshot of the Okta Create token form with fields for token name and IP restriction, and the Create token button highlighted.":::
6478

@@ -91,9 +105,11 @@ This section provides instructions for connecting Microsoft Defender for Identit
91105

92106
### Create a custom Okta role
93107

94-
To support ongoing API access, Read-Only Administrator role and the custom Defender for Identity role are required.
108+
> [!NOTE]
109+
> To support ongoing API access, you must assign both the **Read-Only Administrator role** and the **custom Microsoft Defender for Identity role.** These roles are mandatory to successfully configure the Okta connector. Configuration fails if either role is missing.
95110
96-
After assigning both roles, you can remove the Super Admin role. This ensures that only relevant permissions are assigned to your Okta account at all times.
111+
112+
After you assign both roles, you can remove the **Super Admin role**. This approach ensures that only relevant permissions are assigned to your Okta account at all times.
97113

98114
1. Navigate to **Security > Administrator**.
99115
1. Select the **Roles** tab.
@@ -134,25 +150,39 @@ To complete the configuration in Okta, assign the custom role and resource set t
134150

135151
1. When you're done, remove the Super Admin role from the account.
136152

137-
### Connect Okta to Defender for Identity
153+
### Connect Okta to Microsoft Defender for Identity
154+
155+
1. Navigate to the Microsoft Defender Portal.
156+
1. Select **System** > **Data management** > **Data connectors** > **Catalog**
138157

139-
1. Navigate to the Microsoft Defender Portal
140-
1. Select **Settings** > **Identities** > **Okta integration**
158+
:::image type="content" source="media/okta-integration/system-data-connector-catalog.png" alt-text="Screenshot showing where to find the Okta connector in the Defender portal." lightbox="media/okta-integration/system-data-connector-catalog.png":::
141159

142-
:::image type="content" source="media/okta-integration/select-settings-okta-integration.png" alt-text="Screenshot showing the Microsoft Defender for Identity settings page with the Okta Integration option highlighted.":::
160+
1. Select **Okta Single Sign-On** > **Connect a connector**.
143161

144-
1. Select **+Connect Okta instance**.
145-
1. Enter your Okta domain (for example, acme.okta.com).
162+
:::image type="content" source="media/okta-integration/select-okta-single-sign-on.png" alt-text="Screenshot that shows the connector option for Okta single sign-on." lightbox="media/okta-integration/select-okta-single-sign-on.png":::
163+
1. Enter a name for your connector.
164+
1. Enter your Okta domain (for example, my.project.okta.com).
146165
1. Paste the API token you copied from your Okta account.
147-
1. Select **Save**.
166+
1. Select **Next**.
167+
168+
:::image type="content" source="media/okta-integration/connect-new-okta-single-sign-on-connector.png" alt-text="Screenshot that shows where to add the connector name, domain, and API key.":::
169+
170+
1. **Select products > Microsoft Defender for Identity**
171+
1. Select **Next**
148172

149-
:::image type="content" source="media/okta-integration/connect-okta-instance.png" alt-text="Screenshot that shows how to connect your Okta instance.":::
173+
:::image type="content" source="media/okta-integration/select-product-defender-for-identity.png" alt-text="Screenshot that shows the product page for connecting Okta to Microsoft Defender for Identity." lightbox="media/okta-integration/select-product-defender-for-identity.png":::
150174

175+
1. Review Okta details, and select **Connect**.
176+
177+
:::image type="content" source="media/okta-integration/review-okta-details.png" alt-text="Screenshot that shows the Okta connector details." lightbox="media/okta-integration/review-okta-details.png":::
151178
1. Verify that your Okta environment appears in the table as enabled.
152179

153-
:::image type="content" source="media/okta-integration/new-okta-domain.png" alt-text="Screenshot that shows the Okta environment has been added and is enabled.":::
180+
:::image type="content" source="media/okta-integration/okta-connected.png" alt-text="Screenshot that shows the Okta single sign-on connector was successfully connected.":::
181+
182+
183+
> [!NOTE]
184+
> Connecting the Okta connector can take up to 15 minutes.
154185
155186
## Related articles
156187

157-
- [Defender for Identity VPN integration in Microsoft Defender XDR](vpn-integration.md)
158-
- [Microsoft Defender for Identity extends ITDR capabilities to Okta identities](https://techcommunity.microsoft.com/blog/MicrosoftThreatProtectionBlog/microsoft-defender-for-identity-extends-itdr-capabilities-to-okta-identities/4418955)
188+
- [How Defender for Identity helps protect your Okta environment](okta-defender-for-identity-overview.md).

ATPDocs/toc.yml

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -85,12 +85,16 @@ items:
8585
href: deploy/event-collection-overview.md
8686
- name: Configure audit policies for Windows event logs
8787
href: deploy/configure-windows-event-collection.md
88-
- name: Integrate with identity services
89-
items:
88+
- name: Integrate with identity services
89+
items:
90+
- name: Microsoft Defender for Identity and Okta
91+
items:
92+
- name: Overview
93+
href: okta-defender-for-identity-overview.md
94+
- name: Connect Okta to Microsoft Defender for Identity (Preview)
95+
href: okta-integration.md
9096
- name: Integrate Defender for Identity with PAM services
9197
href: integrate-microsoft-and-pam-services.md
92-
- name: Integrate Defender for Identity with Okta (Preview)
93-
href: okta-integration.md
9498
- name: Manage
9599
items:
96100
- name: View the ITDR dashboard
@@ -162,6 +166,8 @@ items:
162166
href: remediation-actions.md
163167
- name: Security posture
164168
items:
169+
- name: Identity security initiative (Preview)
170+
href: identity-security-initiative.md
165171
- name: Overview
166172
href: security-assessment.md
167173
- name: Hybrid security
@@ -277,8 +283,7 @@ items:
277283
href: limit-number-okta-super-admin-accounts.md
278284
- name: Remove dormant Okta privileged accounts
279285
href: remove-dormant-okta-privileged-accounts.md
280-
- name: Identity security initiative (Preview)
281-
href: identity-security-initiative.md
286+
282287
- name: Reference
283288
items:
284289
- name: Operations guide

0 commit comments

Comments
 (0)