-
Notifications
You must be signed in to change notification settings - Fork 174
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ignore Okta internal admin console accesses in stolen session rule #1086
Ignore Okta internal admin console accesses in stolen session rule #1086
Conversation
We're seeing the same events generated from the browser plugin and dashboard itself too. It might be worth including all four app IDs? |
Some bad news is I don't think this solution totally works. At least, it won't work if you make use of "Okta Access Requests" which aren't Instead, I think we might need to change the keys themselves. Instead of relying purely on the I'm going to try that internally and will update this PR later if that seems to work. |
@JosiahOne -- that might be a good approach and one we were looking at internally as well. Feel free to include the change in this PR 👍🏻 |
@JosiahOne @egibs I think the most complete solution is something like comparing |
Hmm. After looking further, handling the Access Requests case robustly is non-trivial. I was wrong and it is not the case that the Worse, it also looks like It might be preferable to merge this PR as-is (or, perhaps, with the few additional |
Also, regarding the other |
I think this makes sense for now; addressing the prevalent cases frees up cycles to work on the remaining gaps. |
I've applied the The more broad change I made is a modification to the rule that set the Let me know if that'd be a useful change to propose in this repo and I'd be happy to submit a pull request. |
@skottler -- go for it! We'd be more than happy to look at it. I was working on a change to track the |
Background
Okta may include events in the system log that make it look like an Okta (admin) user suddenly changed user agent and IP: https://support.okta.com/help/s/article/okta-integrations-showing-as-rawuseragent-with-okta-ips?language=en_US
Prior to February 7, the
externalSessionId
was "unknown" which meant this Panther rule ignored the problematic events. However, starting February 7th this seems to have changed and Okta has started generating session ids corresponding to these Okta-owned, internal events.The result is that we (a customer of Panther's) started getting hit with alerts making it seem like sessions were hijacked when in fact it's just that these internal Okta user agent/ip events were causing alerts to fire.
Changes
To fix this, note that the
client.id
field contains a unique ID associated with internal Okta applications. You can find some of these IDs documented as part of the following Okta API: https://developer.okta.com/docs/api/openapi/okta-myaccount/myaccount/tag/OktaApplications/To mitigate the noise, I've started by checking for the "Admin Console" application and ignore events associated with that.
Testing
pat test