- 重要な情報
- はじめに
- 用語集
- ガイド
- エージェント
- インテグレーション
- OpenTelemetry
- 開発者
- API
- CoScreen
- アプリ内
- Service Management
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
Set up the okta integration.
Detect an Okta session impersonation.
This rule lets you monitor the following Okta events to detect a user session impersonation:
user.session.impersonation.initiate
user.session.impersonation.end
user.session.impersonation.grant
user.session.impersonation.extend
user.session.impersonation.revoke
These events indicate that the user: {{@usr.email}}
has the effective permissions of the impersonated user. This is likely to occur through Okta support access. This blog illustrates the potential impact an attacker can cause by impersonation session.
{{@usr.email}}
is authorized to impersonate a user session.{{@usr.email}}
during the session and revert back to the last known good state.