The OktaHound collector is currently in beta. It will be replaced by a generic OpenGraph collector in a future release.
Authentication Options
Okta supports multiple authentication methods for applications like the OktaHound collector to access the Okta API:OAuth 2.0 Service Application (Recommended)
Register OktaHound as a service application in Okta. Grant the application limited read-only permissions, then configure authentication with either a symmetric client secret or an asymmetric RSA public/private key pair. Use an RSA public/private key pair when possible, because it provides stronger security than a symmetric client secret.API Token (SSWS)
The OktaHound collector can also authenticate using API tokens (also known as SSWS tokens) associated with specific Okta Super Administrator accounts. This is the least secure option, but the easiest one to set up.Download the Collector
Download the latest beta release of OktaHound specific to your operating system from the releases page on GitHub and extract the archive.Configure Authentication
Rename theokta.sample.oauth.yaml template file to okta.yaml and fill in the Okta organization URI, client ID, and private key from the application registration process.
You must convert the private key from JSON to YAML.
okta.sample.token to okta.yaml, then set the Okta organization URI and API token:
Run the Collector
Run the following command to start collecting data from your Okta organization:Command Line Options
Thecollect subcommand supports the following options:
| Option | Short | Default | Description |
|---|---|---|---|
--output | -o | ./output | Path to the OpenGraph output directory |
--domain | -d | Okta domain URL (e.g. https://contoso.okta.com). Overrides okta.yaml setting if provided. | |
--token | -t | SSWS API token. Overrides okta.yaml setting if provided. | |
--skip-mfa | Skip collecting user authentication factors (MFA) | ||
--zip | -z | Compress each exported JSON output file after it is written | |
--export-ad-nodes | -a | Export the Active Directory subgraph output file | |
--verbosity | -v | Information | Set output verbosity (Trace, Debug, Information, Warning, Error, Critical) |
API Rate Limiting
Okta enforces API rate limits to mitigate denial-of-service attacks. The OktaHound collector sometimes hits the limit of 20 calls per second to the/api/v1/apps/* and /oauth2/v1/clients/* endpoints for the Integrator Free Plan.