Configure Okta for Arctic Wolf Active Response
With the Active Response service, Arctic Wolf® can can perform identity-based response actions in your network using Okta.
Okta supports these response actions:
- Disable/Enable a user
Note: Arctic Wolf cannot take identity-based actions on Okta user accounts with super administrator permissions.
- Close user connections
- Add/Remove a user from a security group
- Force a password reset
For more information, see Response action descriptions.
Note:
Configure this integration with your primary identity provider in a cloud-based environment. Arctic Wolf does not support hybrid or on-premises environments for identity-based response actions.
These resources are required:
-
A user account with Super Administrator permissionsNote:
This user must remain active for as long as the API token is in use.
- Contact your CST to validate the Active Response integration. Have an account or environment ready that Arctic Wolf can use to validate the desired response actions without causing interruptions.
Create a custom Okta user for Active Response
- Sign in to the Okta Admin Console.
- Create a resource set:
- Create a role:
- Create the custom user:
- Assign the role to the custom user:
- Sign out of the Okta Admin Console.
Create an Okta API token for Active Response
Revoke privileges for the custom Okta user
- Sign in to the Okta Admin Console using the Super Administrator credentials.
- Navigate to .
- Click the Admins List tab.
- Locate the custom user that you created in Create a custom Okta user for Active Response, and then click .
- Click
Delete for the Read-only Administrator role assignment.