Skip to main content
Applies to BloodHound Enterprise and CE

Overview

Client secrets are used by API service integrations and OIDC applications to authenticate with Okta and obtain access tokens. Okta client secret creation An application can have up to two client secrets configured, to allow for secret rotation. Okta client secret rotation Client secrets are represented as Okta_ClientSecret nodes in BloodHound.

Edges

The tables below list edges defined by the OktaHound extension only. Additional edges to or from this node may be created by other extensions.

Inbound Edges

Edge TypeSource Node TypesTraversable
Okta_ReadClientSecretOkta_User, Okta_Group, Okta_Application

Outbound Edges

Edge TypeDestination Node TypesTraversable
Okta_SecretOfOkta_Application, Okta_ApiServiceIntegration

Properties

NameSourceTypeDescription
idsecret.idstringUnique client secret identifier.
namesecret.secretHashstringHash of the secret value used as name/display label.
displayNamesecret.secretHashstringDisplay label used in BloodHound.
oktaDomainCollector context (non-API)stringOkta organization domain where the client secret exists.
statussecret.statusstringCurrent lifecycle status of the secret.
createdsecret.createddatetimeSecret creation timestamp.
lastUpdatedsecret.lastUpdateddatetimeLast update timestamp for the secret metadata.

Sample Property Values

id: ocsxqwizfyqsf0aVG697
name: T1e6fl4jGqvPkgd94NKx5g
displayName: T1e6fl4jGqvPkgd94NKx5g
oktaDomain: contoso.okta.com
status: ACTIVE
created: 2025-11-24T12:24:08.000Z
lastUpdated: 2025-11-24T12:24:08.000Z
For security reasons, the OktaHound collector does not write cleartext client secrets to the OpenGraph JSON, only their hashed identifiers.