Skip to main content
Applies to BloodHound Enterprise and CE

Overview

Identity Providers (IdPs) in Okta represent external authentication sources that can be used to authenticate users. These can include social identity providers (such as Google, Facebook, or Microsoft), enterprise identity providers using SAML or OIDC, or other Okta organizations in an Org2Org configuration. When users authenticate through an external identity provider, Okta can optionally create or link user accounts, enabling federated authentication across multiple systems. In OktaHound, identity providers are represented as Okta_IdentityProvider nodes.
The inbound identity provider routing rules and JIT (Just-In-Time) provisioning settings are currently not evaluated by OktaHound.

Edges

The tables below list edges defined by the OktaHound extension only. Additional edges to or from this node may be created by other extensions.

Inbound Edges

Outbound Edges

Edge TypeDestination Node TypesTraversable
Okta_IdentityProviderForOkta_User
Okta_IdpGroupAssignmentOkta_Group

Properties

These properties are common for all identity provider types:
NameSourceTypeDescription
ididp.idstringUnique identity provider identifier.
nameidp.namestringIdentity provider name.
displayNameidp.namestringDisplay label used in BloodHound.
oktaDomainCollector context (non-API)stringOkta organization domain where the identity provider exists.
issuerModeidp.issuerModestringIssuer mode for the identity provider.
typeidp.typestringIdentity provider category/type.
enabledidp.status == "ACTIVE"boolWhether the IdP is active/enabled.
autoUserProvisioningidp.policy.provisioning.action == "AUTO"boolWhether automatic user provisioning is enabled.
governedGroupIdsidp.policy.provisioning.groupsstring[]Group IDs governed by this IdP provisioning policy.
protocolTypeidp.protocol.*.type[0]stringProtocol configured for authentication through this IdP.
urlidp.protocol.*.endpoints.*.url[0]stringPrimary authorization/SSO endpoint URL for the IdP.
createdidp.createddatetimeIdP creation timestamp.
Additional properties are provider-specific:
NameSourceTypeDescription
entraTenantIdTenantIdFromSamlEndpoint(url)stringAssociated Entra tenant ID when identifiable.

Sample Property Values

id: 0oazpi53t1cRNcPL4697
name: Microsoft Entra ID
displayName: Microsoft Entra ID
oktaDomain: contoso.okta.com
created: 2026-01-31T15:21:37+00:00
issuerMode: DYNAMIC
type: MICROSOFT
enabled: false
autoUserProvisioning: true
governedGroupIds: []
protocolType: OIDC
url: https://login.microsoftonline.com/common/oauth2/v2.0/authorize