Okta Desktop Single Sign On (DSSO) from unexpected profile source

이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects Okta Desktop Single Sign On through a non‑priority profile source.

Strategy

This rule monitors Okta authentication events for user.authentication.dsso_via_non_priority_source events.

The debugContext.debugData object contains the prioritized profile source and the actual profile source used during the DSSO attempt for {{@debugContext.debugData.oktaUserEmail}}.

The highest priority profile source is typically expected in this flow. The presence of this log event might be benign or might indicate an attempt to authenticate the user from a compromised Active Directory domain or another source that establishes user profiles in Okta.

Triage & Response

  • Examine surrounding login events for {{@debugContext.debugData.oktaUserEmail}} to confirm abnormal behavior.
  • Identify the profile used, {{@debugContext.debugData.incomingProfileSourceInstanceId}}, and validate it is trusted and expected for the organization within the Okta Admin console.
  • Analyze subsequent activity by {{@debugContext.debugData.oktaUserEmail}} after the DSSO event, including sensitive application access or administrative changes, to evaluate risk.
  • If the access event is unexpected or resulted in suspicious activities, initiate your incident response plan.