OneLogin administrator assumed a user
Set up the onelogin integration.
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Goal
Detect when a OneLogin user with appropriate privileges assumes another OneLogin user’s identity. Logging in as another user allows the user to view another OneLogin user’s account and perform actions on their behalf.
Strategy
This rule lets you monitor the following OneLogin events to detect when an administrator assumes another OneLogin user’s identity:
@evt.name:USER_ASSUMED_USER
Triage and response
- Determine whether the user (
{{@usr.name}}
) should be legitimately assuming another user’s identity. - If the activity was not legitimate, review all activity from
{{@usr.name}}
and the IP ({{@network.client.ip}}
) associated with this signal.