You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/alerts-xdr.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.reviewer: rlitinsky
8
8
9
9
# Microsoft Defender for Identity XDR alerts
10
10
11
-
Microsoft Defender for Identity alerts can appear in the Microsoft Defender XDR portal in two different formats depending on if the alert originates from Defender for Identity or Defender XDR. All alerts are based on detections from Defender for Identity sensors. The differences in layout and information are part of an ongoing transition to a unified alerting experience across Microsoft Defender products. This article lists
11
+
Microsoft Defender for Identity alerts can appear in the Microsoft Defender XDR portal in two different formats depending on if the alert originates from Defender for Identity or Defender XDR. All alerts are based on detections from Defender for Identity sensors. The differences in layout and information are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
12
12
13
13
To learn more about how to understand the structure, and common components of all Defender for Identity security alerts, see [View and manage alerts](understanding-security-alerts.md).
title: How Microsoft Defender for Identity protects your Okta accounts
3
+
description: Learn how Microsoft Defender for Identity protect your Okta accounts and what the integration enables.
4
+
ms.date: 08/07/2025
5
+
ms.topic: overview
6
+
ms.reviewer: himanch
7
+
# customer-intent: As a security administrator, I want to understand what happens when I connect Okta to Microsoft Defender for Identity, so that I can decide whether to enable the integration.
8
+
---
9
+
10
+
# How Microsoft Defender for Identity protects your Okta accounts
11
+
12
+
Okta is a cloud-based identity and access management (IAM) platform that helps organizations control how users and administrators sign in and access enterprise applications. Okta manages high-value identities, including privileged accounts and API tokens. As a result, it’s a frequent target for misuse or attack. Many organizations use Okta alongside on-premises systems like Active Directory and cloud services like Microsoft Entra ID. This hybrid model can make it harder to monitor identity activity and detect threats consistently across platforms.
13
+
14
+
When you connect Okta to Microsoft Defender for Identity, you can extend your identity threat detection and investigation capabilities to include Okta-managed users. Defender for Identity ingests user and activity data from Okta and correlates it with identity data from Active Directory and Microsoft Entra ID. This integration gives you a centralized view of user activity, posture risks, and suspicious behavior across your identity infrastructure, and you can take the necessary remediation actions.
15
+
16
+
17
+
> [!NOTE]
18
+
> The **Identity details** page in the Microsoft Defender portal shows the **Okta user risk score** only if the **Identity Threat Protection with Okta AI** feature is enabled. For more information, see [Risk scoring (Okta Identity Engine)](https://help.okta.com/oie/en-us/content/topics/security/security_risk_scoring.htm).
19
+
20
+
## What you can do after connecting Okta
21
+
22
+
With Okta connected, Defender for Identity provides the following capabilities:
23
+
24
+
25
+
|Capability |Description |
26
+
|---------|---------|
27
+
|View Okta accounts in the Identity Inventory | Defender for Identity adds Okta users to the identity inventory in the Microsoft Defender portal. These accounts correlate with matching identities from Active Directory or Microsoft Entra ID, to allow unified tracking across platforms. |
28
+
|Improve Okta security posture | Defender for Identity evaluates identity configuration in Okta and surfaces posture recommendations in Microsoft Secure Score. Example recommendations include: <br> - [Assign multifactor authentication to Okta privileged user accounts](assign-multi-factor-authentication-okta-privileged-user-accounts.md) <br> - [Change password for Okta privileged user accounts](change-okta-password-privileged-user-accounts.md) <br> - [High number of Okta accounts with privileged role assigned](high-number-of-okta-accounts-with-privileged-role-assigned.md) <br> - [Highly privileged Okta API token](highly-privileged-okta-api-token.md) <br> - [Limit the number of Okta Super Admin accounts](limit-number-okta-super-admin-accounts.md) <br> - [Remove dormant Okta privileged accounts](remove-dormant-okta-privileged-accounts.md)|
29
+
|Get alerts on suspicious Okta activity | Defender for Identity alerts you when it detects high-risk behavior in Okta, including anonymous sign-ins, privileged role assignments, and token abuse. These alerts are available in Microsoft Defender XDR. When connected, Defender for Identity raises the following alerts based on Okta activity: <br> - Okta anonymous user access <br> - Privileged API token created <br> - Privileged API token updated <br> - Privileged Role assignment to Application <br> - Suspicious privileged role assignment <br> For a full list of supported alerts, see: [Defender for Identity XDR alerts](/defender-for-identity/alerts-xdr#initial-access-alerts). |
30
+
|Use advanced hunting to investigate Okta activity | Advanced hunting lets you investigate identity activity across different services including Okta, Active Directory, and Microsoft Entra ID. <br> The **IdentityInfo** table includes account metadata such as privilege level, group membership, and identity source. <br> The **IdentityEvents** table includes events related to those identities, such as sign-ins, authentication attempts, and identity-related alerts across supported identity providers. <br> To explore the full schema and build your own queries, see: <br> - [IdentityInfo ](/defender-xdr/advanced-hunting-identityinfo-table) <br> - [IdentityEvents(Preview)](/defender-xdr/advanced-hunting-identityevents-table). |
31
+
|Take remediation actions | When Microsoft Defender for Identity identifies an identity as at risk, you can take the following remediation actions directly from the Defender portal to update the user's status in Okta. <br> - Revoke all user's sessions <br> - Deactivate user in Okta <br> - Set user risk in Okta <br> For more information, see: [Remediation actions in Microsoft Defender for Identity](remediation-actions.md#roles-and-permissions). |
32
+
33
+
34
+
## Next steps
35
+
36
+
-[Connect Okta to Microsoft Defender for Identity](okta-integration.md)
Copy file name to clipboardExpand all lines: ATPDocs/okta-integration.md
+61-31Lines changed: 61 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,44 +1,58 @@
1
1
---
2
-
title: Microsoft Defender for Identity Okta integration |
3
-
description: Learn how about connecting your Okta app to Defender for Identity using the API connector.
4
-
ms.date: 05/19/2025
2
+
title: Connect Okta to Microsoft Defender for Identity (Preview)
3
+
description: Learn how to connect your Okta app to Defender for Identity using the API connector.
4
+
ms.date: 08/07/2025
5
5
ms.topic: how-to
6
-
ms. reviewer: izauer-bit
6
+
ms. reviewer: Himanch
7
7
---
8
8
9
-
# Integrate Okta with Microsoft Defender for Identity (Preview)
9
+
# Connect Okta to Microsoft Defender for Identity (Preview)
10
10
11
-
Okta manages how users and customers sign in and get access to key systems. Since it plays a central role in identity and access management, any compromise whether accidental or intentional can lead to serious security risks. By integrating Microsoft Defender for Identity with Okta, you gain stronger identity protection. Defender for Identity monitors sign-in activity, detects unusual behavior, and highlights threats related to compromised or misused identities. It also identifies risks like suspicious role assignments or unused high-privilege accounts, using Okta data to deliver clear, actionable insights that help keep your organization secure.
11
+
This page explains how to connect Microsoft Defender for Identity to your Okta account using the Unified Connectors experience. This connection provides visibility into Okta activity and enables shared data collection across Microsoft security products. The Unified Connectors experience allows Defender for Identity to collect Okta system logs once and share them with other supported Microsoft security products, such as Microsoft Sentinel. This reduces API usage, avoids duplicate data collection, and simplifies connector management. For more information, see [Unified connectors overview](/azure/sentinel/unified-connector).
12
+
13
+
> [!NOTE]
14
+
> If your Okta environment is already integrated with [Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-okta), connecting it to Microsoft Defender for Identity can cause duplicate Okta data, such as user activity, to appear in the Defender portal.
12
15
13
16
## Prerequisites
14
17
15
18
Before connecting your Okta account to Microsoft Defender for Identity, make sure the following prerequisites are met:
16
19
17
-
1. Your Okta environment must have one of the following licenses:
20
+
### Okta licenses
18
21
19
-
- Developer
22
+
Your Okta environment must have one of the following licenses:
20
23
21
-
- Enterprise
24
+
- Developer
22
25
23
-
> [!NOTE]
24
-
> The Super Admin role is required only to create the API token. Once the token is created, remove the role and assign the Read-Only Administrator and Defender for Identity custom roles for ongoing API access.
26
+
- Enterprise
25
27
28
+
### Okta roles
29
+
30
+
The Super Admin role is required only to create the API token. After you create the token, remove the role and assign the Read-Only Administrator and Defender for Identity custom roles for ongoing API access.
26
31
27
-
> [!NOTE]
28
-
> If your Okta environment is already integrated with [Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-okta), connecting it to Microsoft Defender for Identity might cause duplicate Okta data, such as user activity, to appear in the Defender portal.
29
32
33
+
### Microsoft Entra and Defender XDR role-based access options
34
+
To configure the Okta connector in Microsoft Defender for Identity, your account must have either of the following access configurations assigned:
35
+
36
+
-**Microsoft Entra roles:**
37
+
38
+
- Security Operator
39
+
- Security Admin
40
+
41
+
-**Defender XDR Unified RBAC permission:**
42
+
43
+
- Core security settings (manage)
30
44
31
45
### Connect Okta to Microsoft Defender for Identity
32
46
33
47
This section provides instructions for connecting Microsoft Defender for Identity to your dedicated Okta account using the connector APIs. This connection gives you visibility into and control over Okta use.
34
48
35
49
### Create a dedicated Okta account
36
50
37
-
1. Create a dedicated Okta account that is used only for Microsoft Defender for Identity.
51
+
1. Create a dedicated Okta account for Microsoft Defender for Identity use only.
38
52
1. Assign your Okta account as a Super Admin role.
39
53
1. Verify your Okta account.
40
54
1. Store the account credentials for later use.
41
-
1. Sign in to your dedicated Okta account created in step 1 in order to create an API token.
55
+
1. Sign in to your dedicated Okta account created in step 1 to create an API token.
42
56
43
57
### Create an API token
44
58
@@ -56,9 +70,9 @@ This section provides instructions for connecting Microsoft Defender for Identit
56
70
:::image type="content" source="media/okta-integration/create-an-okta-token.png" alt-text="Screenshot of the Okta API Tokens tab with the Create token button highlighted.":::
57
71
58
72
1. In the Create token pop-up:
59
-
1. Enter a name for your Defender for Identity token
60
-
2. Select Any IP
61
-
3. Select Create token.
73
+
1. Enter a name for your Defender for Identity token.
74
+
2. Select **Any IP**.
75
+
3. Select **Create token**.
62
76
63
77
:::image type="content" source="media/okta-integration/enter-okta-token-details.png" alt-text="Screenshot of the Okta Create token form with fields for token name and IP restriction, and the Create token button highlighted.":::
64
78
@@ -91,9 +105,11 @@ This section provides instructions for connecting Microsoft Defender for Identit
91
105
92
106
### Create a custom Okta role
93
107
94
-
To support ongoing API access, Read-Only Administrator role and the custom Defender for Identity role are required.
108
+
> [!NOTE]
109
+
> To support ongoing API access, you must assign both the **Read-Only Administrator role** and the **custom Microsoft Defender for Identity role.** These roles are mandatory to successfully configure the Okta connector. Configuration fails if either role is missing.
95
110
96
-
After assigning both roles, you can remove the Super Admin role. This ensures that only relevant permissions are assigned to your Okta account at all times.
111
+
112
+
After you assign both roles, you can remove the **Super Admin role**. This approach ensures that only relevant permissions are assigned to your Okta account at all times.
97
113
98
114
1. Navigate to **Security > Administrator**.
99
115
1. Select the **Roles** tab.
@@ -134,25 +150,39 @@ To complete the configuration in Okta, assign the custom role and resource set t
134
150
135
151
1. When you're done, remove the Super Admin role from the account.
136
152
137
-
### Connect Okta to Defender for Identity
153
+
### Connect Okta to Microsoft Defender for Identity
:::image type="content" source="media/okta-integration/system-data-connector-catalog.png" alt-text="Screenshot showing where to find the Okta connector in the Defender portal." lightbox="media/okta-integration/system-data-connector-catalog.png":::
141
159
142
-
:::image type="content" source="media/okta-integration/select-settings-okta-integration.png" alt-text="Screenshot showing the Microsoft Defender for Identity settings page with the Okta Integration option highlighted.":::
160
+
1. Select **Okta Single Sign-On** > **Connect a connector**.
143
161
144
-
1. Select **+Connect Okta instance**.
145
-
1. Enter your Okta domain (for example, acme.okta.com).
162
+
:::image type="content" source="media/okta-integration/select-okta-single-sign-on.png" alt-text="Screenshot that shows the connector option for Okta single sign-on." lightbox="media/okta-integration/select-okta-single-sign-on.png":::
163
+
1. Enter a name for your connector.
164
+
1. Enter your Okta domain (for example, my.project.okta.com).
146
165
1. Paste the API token you copied from your Okta account.
147
-
1. Select **Save**.
166
+
1. Select **Next**.
167
+
168
+
:::image type="content" source="media/okta-integration/connect-new-okta-single-sign-on-connector.png" alt-text="Screenshot that shows where to add the connector name, domain, and API key.":::
169
+
170
+
1.**Select products > Microsoft Defender for Identity**
171
+
1. Select **Next**
148
172
149
-
:::image type="content" source="media/okta-integration/connect-okta-instance.png" alt-text="Screenshot that shows how to connect your Okta instance.":::
173
+
:::image type="content" source="media/okta-integration/select-product-defender-for-identity.png" alt-text="Screenshot that shows the product page for connecting Okta to Microsoft Defender for Identity." lightbox="media/okta-integration/select-product-defender-for-identity.png":::
150
174
175
+
1. Review Okta details, and select **Connect**.
176
+
177
+
:::image type="content" source="media/okta-integration/review-okta-details.png" alt-text="Screenshot that shows the Okta connector details." lightbox="media/okta-integration/review-okta-details.png":::
151
178
1. Verify that your Okta environment appears in the table as enabled.
152
179
153
-
:::image type="content" source="media/okta-integration/new-okta-domain.png" alt-text="Screenshot that shows the Okta environment has been added and is enabled.":::
180
+
:::image type="content" source="media/okta-integration/okta-connected.png" alt-text="Screenshot that shows the Okta single sign-on connector was successfully connected.":::
181
+
182
+
183
+
> [!NOTE]
184
+
> Connecting the Okta connector can take up to 15 minutes.
154
185
155
186
## Related articles
156
187
157
-
-[Defender for Identity VPN integration in Microsoft Defender XDR](vpn-integration.md)
158
-
-[Microsoft Defender for Identity extends ITDR capabilities to Okta identities](https://techcommunity.microsoft.com/blog/MicrosoftThreatProtectionBlog/microsoft-defender-for-identity-extends-itdr-capabilities-to-okta-identities/4418955)
188
+
-[How Defender for Identity helps protect your Okta environment](okta-defender-for-identity-overview.md).
0 commit comments