Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook will collect user information from Okta and post a report on the incident.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Okta Single Sign-On |
| Source | View on GitHub |
📄 Source: OktaPlaybooks/Okta-EnrichIncidentWithUserDetails/readme.md
## Summary
When a new Microsoft Sentinel incident is created, this playbook gets triggered and performs below actions
1. Fetches the user details and user group details from Okta
2. Adds a rich comment to the incident with all the collected information

Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deplyoing an ARM Template wizard.
Fill in the required paramteres:
Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for Okta Api Connection (For authorizing the Okta API connection, API Key needs to be provided)
Microsoft Sentinel incident is created. The playbook receives the incident as the input.
Get the list of risky/malicious accounts as entities from the Incident
Initialize an array variable to compose user group details to use it later while updating the incident
Iterates on the accounts found in this incident (probably one) and performs the following:
a. Compose array of groups for updating incident with group details
b. Append groups to group array variable
Create HTML table format of user group details such as group id,group name and group description
Add a comment to the incident with the information below:
a. User information collected by "Get User" action from Okta such as
b. User groups information collected by "Get User Groups" action from Okta such as
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊