steampipe plugin install okta

Table: okta_factor - Query Okta Factors using SQL

Okta Factors are the different methods of authentication used by Okta users. These can range from password-based authentication to more advanced methods like biometric authentication. Understanding these factors is crucial for maintaining the security and integrity of an Okta environment.

Table Usage Guide

The okta_factor table provides insights into the authentication methods used within Okta. As a security engineer, explore factor-specific details through this table, including the type of factor, status, and associated metadata. Utilize it to uncover information about factors, such as those that are less secure, the distribution of factor types among users, and potential vulnerabilities in authentication methods.

Examples

Basic info

Explore which security factors have been created for each user and their current status. This can be useful to understand the security measures in place for each user and if they are active or not.

select
id,
user_id,
factor_type,
created,
status
from
okta_factor;
select
id,
user_id,
factor_type,
created,
status
from
okta_factor;

List factors pending activation

Explore which security factors are awaiting activation, enabling you to take necessary actions to ensure user accounts are secure and fully functional. This helps in maintaining the security standards and smooth operation of your system.

select
id,
user_id,
factor_type,
created,
status
from
okta_factor
where
status = 'PENDING_ACTIVATION';
select
id,
user_id,
factor_type,
created,
status
from
okta_factor
where
status = 'PENDING_ACTIVATION';

List factors provided by Okta

Explore which factors are provided by Okta to gain insights into the status and creation dates of these factors. This can be useful in managing user security settings and assessing the elements within your Okta environment.

select
id,
user_id,
factor_type,
created,
provider,
status
from
okta_factor
where
provider = 'OKTA';
select
id,
user_id,
factor_type,
created,
provider,
status
from
okta_factor
where
provider = 'OKTA';

Get factor by factor ID and user ID

Determine the security factor settings associated with a specific user, which can be useful in understanding the user's security setup and status. This can be particularly helpful in troubleshooting or auditing security compliance.

select
id,
user_id,
factor_type,
created,
status
from
okta_factor
where
id = 'ost1l5cklwIRvLzUY5d7'
and user_id = '00u1kcigdvWtR96HY5d7';
select
id,
user_id,
factor_type,
created,
status
from
okta_factor
where
id = 'ost1l5cklwIRvLzUY5d7'
and user_id = '00u1kcigdvWtR96HY5d7';

Schema for okta_factor

NameTypeOperatorsDescription
_ctxjsonbSteampipe context in JSON form.
createdtimestamp with time zoneTimestamp when Group was created.
domaintext=, !=, ~~, ~~*, !~~, !~~*The okta domain name.
embeddedjsonbThe Group's Profile properties.
factor_typetextDescription of the Group.
idtext=Unique key for Group.
last_updatedtimestamp with time zoneThe timestamp when the factor was last updated.
profilejsonbSpecific attributes related to the Factor.
providertextThe provider for the factor.
sp_connection_nametext=, !=, ~~, ~~*, !~~, !~~*Steampipe connection name.
sp_ctxjsonbSteampipe context in JSON form.
statustextThe current status of the factor.
titletextThe title of the resource.
user_idtext=Unique key for Group.
user_nametextUnique identifier for the user (username).
verifyjsonbList of all users that are a member of this Group.

Export

This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.

You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh script:

/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- okta

You can pass the configuration to the command with the --config argument:

steampipe_export_okta --config '<your_config>' okta_factor