- 필수 기능
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- 디지털 경험
- 소프트웨어 제공
- 보안
- 로그 관리
- 관리
- 인프라스트럭처
- ci
- containers
- csm
- ndm
- otel_guides
- overview
- slos
- synthetics
- tests
- 워크플로
Set up the okta integration.
Detect an Okta session impersonation.
This rule lets you monitor the following Okta events to detect a user session impersonation:
user.session.impersonation.initiate
user.session.impersonation.end
user.session.impersonation.grant
user.session.impersonation.extend
user.session.impersonation.revoke
These events indicate that the user: {{@usr.email}}
has the effective permissions of the impersonated user. This is likely to occur through Okta support access. This blog illustrates the potential impact an attacker can cause by impersonation session.
{{@usr.email}}
is authorized to impersonate a user session.{{@usr.email}}
during the session and revert back to the last known good state.