Skip to content

Commit 65be8c0

Browse files
committed
fix ms reviewer
1 parent 13e506c commit 65be8c0

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

ATPDocs/okta-integration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Connect Okta to Microsoft Defender for Identity (Preview)
33
description: Learn how to connect your Okta app to Defender for Identity using the API connector.
44
ms.date: 08/07/2025
55
ms.topic: how-to
6-
ms. reviewer: izauer-bit
6+
ms. reviewer: Himanch
77
---
88

99
# Connect Okta to Microsoft Defender for Identity (Preview)
1010

11-
This page explains how to connect Microsoft Defender for Identity to your Okta account using the Unified Connectors experience. This connection provides visibility into Okta activity and enables shared data collection across Microsoft security products. The Unified Connectors experience allows Defender for Identity to collect Okta system logs once and share them with other supported Microsoft security products, such as Microsoft Sentinel. This reduces API usage, avoids duplicate data collection, and simplifies connector management. For more details, see [Unified connectors](/azure/sentinel/unified-connector?branch=pr-en-us-302665#unified-collector-service).
11+
This page explains how to connect Microsoft Defender for Identity to your Okta account using the Unified Connectors experience. This connection provides visibility into Okta activity and enables shared data collection across Microsoft security products. The Unified Connectors experience allows Defender for Identity to collect Okta system logs once and share them with other supported Microsoft security products, such as Microsoft Sentinel. This reduces API usage, avoids duplicate data collection, and simplifies connector management. For more information, see [Unified connectors](/azure/sentinel/unified-connector?branch=pr-en-us-302665#unified-collector-service).
1212

1313
## Prerequisites
1414

@@ -24,9 +24,9 @@ Your Okta environment must have one of the following licenses:
2424
> - The Super Admin role is required only to create the API token. After you create the token, remove the role and assign the Read-Only Administrator and Defender for Identity custom roles for ongoing API access.
2525
> - If your Okta environment is already integrated with [Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-okta), connecting it to Microsoft Defender for Identity can cause duplicate Okta data, such as user activity, to appear in the Defender portal.
2626
27-
## Required Entra roles
27+
## Required Microsoft Entra roles
2828

29-
To successfully set up the Okta connector, ensure that your account has one of the following Entra roles assigned:
29+
To successfully set up the Okta connector, ensure that your account has one of the following Microsoft Entra roles assigned:
3030

3131
- Security Operator
3232
- Security Admin

0 commit comments

Comments
 (0)