Configure Okta for Arctic Wolf monitoring
You can configure Okta® to send the necessary logs to Arctic Wolf® for security monitoring.
These resources are required:
- (Optional) An Okta account to view Okta documentation.
These actions are required:
- Sign in to Okta as a user with administrator permissions. The Read Only Admin, Super Admin, and Org Admin roles have these permissions.
- Arctic Wolf recommends that you use a dedicated Read Only Admin role to create the Okta API token.
Note:
- Before the API token can retrieve the required Okta audit sign-in information, the user creating the API token must have these Okta permissions:
- View users
- View groups
- View System Log
API token permissions match the permissions of the user that creates the token. If the user permissions change, the API token permissions also change.
-
This user must remain active for as long as the API token is in use.
- Before the API token can retrieve the required Okta audit sign-in information, the user creating the API token must have these Okta permissions:
For more information, see Security Administrators.
Create an Okta API token
Configure Okta ThreatInsight to exclude trusted IP addresses
Enable Security Notification emails
- In the Admin Console, click SecurityGeneral.
- In the Security notification emails section, click Edit.
- In the Report suspicious activity via email list, click Enabled.
- Click Save.
Enable phishing-resistant authentication
This step is optional.
Provide Okta credentials to Arctic Wolf
Unused API tokens automatically expire after 30 days. You must provide the token credentials to Arctic Wolf before the expiry date. After Arctic Wolf provisions the API token, it is consistently in use and does not expire.