4.8 KiB
Okta Logic Apps connector and playbook templates
Table of Contents
- Overview
- Deploy Custom Connector + 3 Playbook templates
- Authentication
- Prerequisites
- Deployment
- Post Deployment Steps
- Components of this integration
Overview
Okta is an enterprise-grade, identity management service, built for the cloud, but compatible with many on-premises applications. With Okta, IT can manage any employee's access to any application or device. Okta runs in the cloud, on a secure, reliable, extensively audited platform, which integrates deeply with on-premises applications, directories, and identity management systems.
Deploy Custom Connector + 3 Playbook templates
This package includes:
- Custom connector for Okta
- Three playbook templates leverage Okta custom connector
You can choose to deploy the whole package : connector + all three playbook templates, or each one seperately from it's specific folder.
Okta connector documentation
Authentication
Authentication methods this connector supports- API Key authentication
Prerequisites for using and deploying Custom Connector
- Okta service end point should be known (ex : https://{yourOktaDomain}/)
- Generate an API key.Refer this link how to generate the API Key
- API key needs to have admin previligies to perform specific actions like expire password on okta accounts
Deployment instructions
- Deploy the Custom Connector and playbooks by clicking on "Deploy to Azure" button. This will take you to deplyoing an ARM Template wizard.
- Fill in the required parameteres:
a. For custom connector :
-
Custom Connector name : Enter the Custom connector name (ex:contoso Okta connector)
-
Service Endpoint : Enter the okta service end point (ex:https://{yourOktaDomain})
b. For Okta-EnrichIncidentWithUserDetails playbook :
- Enrich Incident Playbook Name : Enter the playbook name here (Ex:OktaPlaybook)
c. For Okta-PromptUser playbook :
-
Prompt User Playbook Name : Enter the playbook name here (Ex:OktaPlaybook)
-
Teams GroupId : Enter the Teams channel id to send the adaptive card
-
Teams ChannelId : Enter the Teams Group id to send the adaptive card Refer the below link to get the channel id and group id
d. For Okta-ResponseFromTeams playbook :
- Response From Teams Playbook Name : Enter the playbook name here (Ex:OktaPlaybook)
Post-Deployment instructions
a. Authorize connections
Once deployment is complete, you will need to authorize each connection.
- Click the Azure Sentinel connection resource
- Click edit API connection
- Click Authorize
- Sign in
- Click Save
- Repeat steps for other connections such as Teams connection and Okta Api Connection (For authorizing the Okta API connection, API Key needs to be provided)
b. Configurations in Sentinel
- In Azure sentinel analytical rules should be configured to trigger an incident with risky user account
- Configure the automation rules to trigger the playbooks
Components of this integration
Connector
Playbooks