Connect Okta to Anzenna
Integrate Anzenna with Okta to monitor user authentication, device management, application access, and optionally enable identity-based remediations.
Prerequisites
- Okta administrator access
- Anzenna account
- Ability to create API applications in Okta
Overview
The integration provides:
- User directory and authentication logs
- Device management data
- Application access monitoring
- Group memberships
Optional: Policy management and user lifecycle remediations
Step-by-Step Instructions
Part 1: Initial Setup
Navigate to
app.anzenna.ai
Sign in with Google using your corporate account
- Go to the enrollment page
Part 2: Create API Services App in Okta
Access your Okta admin interface
Navigate to Applications > Applications
Click Create App Integration
Select API Services
Click Next
Enter application name:
Anzenna Integrations
Click Save
Part 3: Configure OAuth Settings
In the application settings, note the Client ID
Navigate to Security > API in Okta admin
Find Authorization Servers > default
Click on Settings
Under Token Settings, locate DPoP
Disable "Require Demonstrating Proof of Possession (DPoP) header"
This OAuth security feature must be disabled for Anzenna's integration to function properly.
Part 4: Assign Read-Only Administrator Role
In your Anzenna Integrations app, go to Assignments tab
Click Assign > Assign to People or Assign to Groups
Search for and select Read-only Administrator
Click Assign and Done
Part 5: Grant API Scopes
In the application settings, go to Okta API Scopes tab
Click Grant for the following scopes:
Required scopes for monitoring:
okta.devices.readokta.logs.readokta.users.readokta.groups.readokta.appGrants.readokta.apps.read
okta.devices.read, okta.logs.read, okta.users.read, okta.groups.read, okta.appGrants.read, okta.apps.read
Part 6: Optional Remediation Scopes
If you want Anzenna to perform automated remediations:
Assign Organization Administrator role (in addition to Read-only)
- Grant additional scopes:
okta.policies.readokta.policies.manageokta.groups.manageokta.authenticators.readokta.users.manage
okta.policies.read, okta.policies.manage, okta.groups.manage, okta.authenticators.read, okta.users.manage
Part 7: Get Public Key and Client ID
In the Anzenna Integrations app, go to General tab
Scroll down to Client Credentials
- Copy the Public key URL
- Copy the Client ID
Part 8: Complete Connection in Anzenna
Return to
app.anzenna.ai
Navigate to Settings > Integrations
Find the Okta integration card
- Paste the Public key URL
- Paste the Client ID
Enter your Okta domain (e.g.,
your-company.okta.com)Click Save or Connect
Verify the connection - status should show green/connected within a few seconds
Verification
Check integration status in Anzenna shows Connected
Navigate to Users dashboard
- Verify user data from Okta is syncing
- Review authentication logs are appearing
- Confirm device data is visible
What Data is Collected
User Data
- User directory information
- Authentication events
- Login history
- Failed login attempts
- MFA status
Device Data
- Registered devices
- Device trust status
- Platform information
- Last seen timestamps
Application Data
- Assigned applications
- Application usage
- Grant permissions
- Access patterns
Group Data
- Group memberships
- Group hierarchies
- Role assignments
Remediation Capabilities
With Organization Administrator role and management scopes:
User management - Suspend/unsuspend users
Group management - Add/remove from groups
Policy enforcement - Update security policies
MFA requirements - Enforce authentication factors
Session management - Terminate active sessions
Troubleshooting
Connection Fails
Verify both Public key URL and Client ID are correct
- Check DPoP header requirement is disabled
- Ensure API Services app is active
- Confirm scopes were granted
No Data Syncing
- Wait 15-30 minutes for initial sync
Verify Read-only Administrator role assigned
- Check all required scopes are granted
- Ensure Okta domain is correct
Permission Errors
- Review granted scopes match requirements
- Confirm roles are properly assigned
- Check API rate limits aren't exceeded
Verify organization settings allow API access
Security Considerations
- OAuth 2.0 with public key authentication
- Read-only by default
- Explicit scope-based permissions
- All actions logged in both systems
- Regular scope audits recommended
Best Practices
Start read-only - Add remediation later if needed
Monitor initial sync - Watch for errors
Document credentials - Save public key URL securely
Regular reviews - Audit scopes quarterly
Test remediations - Verify before production use
Related Resources
Need help? Contact
Anzenna Support
for assistance.