Connect Okta to Porcia
Connect your Okta organization to automatically discover all applications your team accesses via Okta SSO.Prerequisites
- Okta organization (any tier)
- Super Administrator privileges in Okta
- 5-10 minutes for setup
You need Super Administrator access to grant the necessary permissions. If you don’t have admin access, ask your IT administrator to set this up.
What Porcia Will Discover
Once connected, Porcia will discover:Applications
All applications configured in your Okta org
User Assignments
Which team members have access to each application
Group Assignments
Group-based application access
Usage Analytics
Login frequency and usage patterns
Step-by-Step Setup
Unlike Google and Microsoft, Okta uses API token authentication rather than OAuth. You’ll need to generate an API token in your Okta Admin Console before connecting.
Generate an Okta API Token
In your Okta Admin Console:
- Go to Security → API → Tokens
- Click Create Token
- Give it a name (e.g., “Porcia Integration”)
- Copy the token — you’ll only see it once
Enter Your Okta Domain and API Token
In the modal, fill in:
- Okta Domain — e.g.,
yourcompany.okta.com(nohttps://) - API Token — the token you generated in Step 1
Submit
Click Connect to save the configuration. Porcia will validate the credentials and begin the initial sync.
Wait for Initial Sync
The initial sync begins automatically and takes 5-10 minutes. Porcia will:
- Discover all applications in your Okta org
- Map user and group assignments
- Analyze recent authentication events
- Match applications to vendor database
Permissions Explained
What We Can Access
Porcia uses your Okta API token (read-only) to access: Application Data (Read-Only):- ✅ Application names, logos, and descriptions
- ✅ Application types (SAML, OIDC, SWA, etc.)
- ✅ Application status (active/inactive)
- ✅ Application settings and configurations
- ✅ User profiles (name, email, department)
- ✅ User status (active/suspended/deprovisioned)
- ✅ User assignments to applications
- ✅ User group memberships
- ✅ Group names and descriptions
- ✅ Group memberships
- ✅ Group assignments to applications
- ✅ Authentication events
- ✅ Application access logs
- ✅ System audit logs
What We CANNOT Do
- ❌ Modify users - We never add, remove, or change users
- ❌ Change app assignments - We never modify who has access to what
- ❌ Access user credentials - We never see passwords or authentication tokens
- ❌ Modify applications - We never change app configurations
- ❌ Create resources - We never create new apps, users, or groups
All permissions are read-only. Porcia cannot make any changes to your Okta configuration.
What Gets Discovered
Application Types
SAML Applications:- Salesforce, ServiceNow, AWS SSO
- Custom SAML integrations
- Enterprise applications
- Modern web applications
- Mobile applications
- API integrations
- Legacy applications with form-based login
- Applications without modern SSO support
- Internal links and bookmarks
- Quick access applications
- Application name and logo
- Vendor identification
- User and group assignments
- Authentication frequency
- Last access date
- Application status
User Access Patterns
Analytics Porcia provides:- Most used applications by team
- Unused application assignments
- Authentication frequency distribution
- Failed authentication attempts
- Group-based access patterns
- Shadow IT detection (apps added without approval)
Okta Integration Types
Porcia supports all Okta deployment types:Okta Workforce Identity
Standard Okta for employees:- Full application discovery
- User and group management
- Authentication analytics
- Policy insights
Okta Customer Identity (Auth0)
Customer-facing applications:- Limited to internal admin applications
- Customer applications not included
- Focus on internal tool discovery
Okta Preview
Preview/sandbox environments:- Full functionality available
- Useful for testing integrations
- Separate from production data
Troubleshooting
Connection Failed
Error: “Invalid domain”- Verify your Okta domain is correct (e.g.,
company.okta.com) - Don’t include
https://in the domain - Check for typos in the domain name
- Ensure the token was copied correctly (no extra spaces)
- Verify the token hasn’t been revoked in Okta Admin Console
- Generate a new token if needed: Security → API → Tokens
- Ensure the admin account that generated the token has Super Administrator privileges
- Check that the account hasn’t been restricted
No Applications Discovered
If no applications appear after sync:- Wait longer - Large Okta orgs can take 10-15 minutes for initial sync
- Check applications - Verify your Okta org has applications configured
- Verify permissions - Ensure all required API scopes were granted
- Check application status - Only active applications are discovered
Sync Stopped Working
If sync stops after working initially:- Check connection status - Go to Settings → Integrations → SSO
- Reconnect if needed - Click Reconnect if status shows “Disconnected”
- Check API token - OAuth tokens may expire; reconnect to refresh
- Check rate limits - Okta has API rate limits; sync will resume automatically
Need Help? Check our FAQ or contact support@porcia.org for SSO troubleshooting assistance.
Okta Admin Console
Viewing Applications
To see all applications in your Okta org:- Go to Okta Admin Console → Applications → Applications
- View all configured applications
- Filter by Status, Type, or Assignment
Managing App Assignments
To control who has access to applications:- Go to Applications → [Select App] → Assignments
- View People and Groups tabs
- Add or remove assignments as needed
System Logs
To view authentication and system logs:- Go to Okta Admin Console → Reports → System Log
- Filter by Event Type (Authentication, Application, etc.)
- Search by User, Application, or IP Address
API Management
To manage API access and tokens:- Go to Okta Admin Console → Security → API
- View Tokens for API token management
- View Trusted Origins for CORS settings
Okta Editions
Porcia works with all Okta editions:| Feature | Starter | Workforce Identity | Enterprise |
|---|---|---|---|
| Application Discovery | ✅ Full | ✅ Full | ✅ Full |
| User Assignments | ✅ Full | ✅ Full | ✅ Full |
| System Logs | ⚠️ Limited | ✅ 90 days | ✅ 90 days |
| Advanced Analytics | ❌ Not available | ✅ Available | ✅ Available |
| API Rate Limits | Lower | Standard | Higher |
Higher Okta editions provide more detailed logs and analytics, resulting in richer insights in Porcia.
Data Sync Frequency
Initial Sync:- Complete application catalog
- All user and group assignments
- 30 days of authentication logs (if available)
- System audit logs
- Applications: Daily (new apps, configuration changes)
- Assignments: Daily (new assignments, group changes)
- Authentication logs: Daily (login events, activity)
- System logs: Daily (configuration changes)
Privacy & Security
Data Storage
- User directory - Names, emails, departments (encrypted)
- Application catalog - App names, logos, configurations
- Authentication logs - Login events, frequency (anonymized in reports)
- Assignment data - User-to-app and group-to-app relationships
Data Protection
- Encryption - AES-256 at rest, TLS 1.3 in transit
- Access control - Only workspace admins can view detailed user data
- Audit logs - Complete audit trail of all sync activity
- Token security - OAuth tokens stored securely with encryption at rest
Compliance
- Data privacy - Right to access, delete, and export data (GDPR compliance in progress)
- Okta Security - Follows Okta’s security best practices
- Zero Trust - Compatible with Zero Trust security models
Security: Porcia follows industry-standard security practices including end-to-end encryption and role-based access control. Full security documentation coming soon.
Disconnecting Okta
To disconnect your Okta organization:- Go to Settings → Integrations → SSO
- Find Okta connection
- Click Disconnect
- Confirm disconnection
Disconnecting will stop new application discovery and usage tracking. Historical data will be preserved unless you choose to delete it.
Revoke Access in Okta
To completely revoke Porcia’s access:- Go to Okta Admin Console → Security → API → Tokens
- Find the token you created for Porcia
- Click Revoke to disable access
Advanced Okta Features
Okta Workflows Integration
If you use Okta Workflows:- Porcia can discover workflow-triggered applications
- Automated provisioning events are tracked
- Workflow-based access patterns are analyzed
Okta Identity Governance
For organizations with Identity Governance:- Access certification data is included
- Compliance reporting is enhanced
- Risk-based access patterns are identified
Multi-Org Okta
For organizations with multiple Okta orgs:- Connect each org separately to Porcia
- Unified view across all organizations
- Useful for merger and acquisition scenarios