heroui logo

Okta Failed SSO Attempts

Splunk Security Content

View Source
Summary
The 'Okta Failed SSO Attempts' rule identifies failed single sign-on (SSO) authentication events in Okta using legacy event types. This detection looks for instances of unauthorized application access attempts, specifically the 'app.generic.unauth_app_access_attempt' events. The rule aggregates data over several parameters such as source user, result, display message, and source IP address, providing a count of failed attempts along with the earliest and latest timestamps of these events. Since the rule is marked as deprecated, it has been replaced by 'Okta Unauthorized Access to Application - DM', emphasizing the evolving nature of security practices and the need for updated detection methods. It's crucial that Okta logs are properly ingested into the Splunk environment for this search to function correctly, and analysts should be aware of potential false positives, such as configuration issues preventing legitimate user access.
Categories
  • Identity Management
  • Cloud
  • Web
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1078
  • T1078.001
Created: 2024-11-14