Skip to main content

Okta

Description

The Okta connector uses the Okta Management REST API to discover user accounts, groups, and group memberships in an Okta organisation. Authentication uses an Okta SSWS API token — no OAuth flow is required. Pagination follows Okta's Link header (rel="next") pattern.

System Type Classification

FieldValue
System TypeDirectory Service
Default Scan Priority10 (scanned first)

Version Support

OrbisID EditionSupported
CommunityNo
ProYes
EnterpriseYes

Supported Protocol

ProtocolPortNotes
Okta Management REST API (HTTPS)443 TCPSSWS token authentication

What OrbisID Discovers

DataSource
User accountsGET /api/v1/users (all statuses)
User statusstatus field (ACTIVE, SUSPENDED, DEPROVISIONED, etc.)
GroupsGET /api/v1/groups (all types)
Group membershipsGET /api/v1/groups/{id}/users
Group typeOKTA_GROUP, APP_GROUP, BUILT_IN — recorded as entitlement type

Connection Requirements

Okta API Token

Create an API token in the Okta Admin Console under Security → API → Tokens. The token inherits the permissions of the admin user who created it.

The token must be created by an admin with at minimum:

  • Read Users permission — to list users and their profiles
  • Read Groups permission — to list groups and group memberships

Recommended: Create a dedicated read-only admin account (e.g., orbisid-scanner@company.com) with the minimum required admin role and generate the API token from that account.

Credential Mapping

OrbisID FieldOkta Value
credential.passwordOkta SSWS API token (the full 00... string)
system.hostnameOkta domain (e.g., company.okta.com)

Network Requirements

The OrbisID server (or On-Premise Agent) must have outbound HTTPS access to https://<company>.okta.com on port 443.

Configuration Steps

  1. Log in to the Okta Admin Console with a read-only admin account
  2. Navigate to Security → API → Tokens → Create Token
  3. Give the token a name (e.g., OrbisID Scanner) and copy the token value
  4. Create a Credential in OrbisID:
    • Username: (leave blank or use the admin email for reference)
    • Password: The Okta API token
  5. Navigate to Systems → Add System
  6. Fill in the fields:
FieldValue
NameDescriptive name (e.g., Okta – company.okta.com)
HostnameYour Okta domain (e.g., company.okta.com)
OS TypeOkta
System TypeDirectory Service
CredentialThe API token credential
  1. Click Test Connection to verify the API token
  2. Click Save
Okta Preview / Sandbox

For Okta preview sandbox environments, set the hostname to your preview domain (e.g., company.oktapreview.com).

Token Expiry

Okta API tokens expire after 30 days of inactivity. Set a calendar reminder to refresh the token before it expires to avoid scan failures.

Troubleshooting

SymptomLikely CauseResolution
Okta API authentication failedInvalid or expired API tokenRegenerate the API token in the Okta Admin Console
Okta API access denied (403)Token lacks required permissionsVerify the admin role has Read Users and Read Groups permissions
No users returnedHostname incorrectEnsure system.hostname is set to the correct Okta domain (not a URL)
Some groups missing membersRate limiting on group member callsLarge Okta tenants may hit rate limits; OrbisID does not currently implement rate-limit backoff — contact support