developer.okta.com
Open in
urlscan Pro
2600:9000:2156:8e00:d:5427:c40:93a1
Public Scan
URL:
https://developer.okta.com/docs/reference/api/event-types/
Submission: On September 06 via api from US — Scanned from DE
Submission: On September 06 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Community * Forum * Toolkit * * * Blog * Pricing * Okta.com * Log in * Core Okta API * Rate Limits * Error Codes * User query options * Sign in Your Users * Authentication * Identity Providers * OpenID Connect & OAuth 2.0 API * WebFinger * Manage Okta Objects * Administrator Roles * Apps * Authenticators Admin * Authorization Servers * Brands * CAPTCHAs * Devices * Domains * Dynamic Client Registration * Event Types * Factors * Features * Groups * Identity Sources * Key Management * Linked Objects * Log Streaming * Mappings * MyAccount * Org * Policy * Push Providers * Risk Events * Risk Providers * Schemas * Sessions * Subscriptions * System Log * Templates * ThreatInsight * Trusted Origins * UI Schema * User Types * Users * Zones Sign up Guides Concepts References Languages & SDKs Release Notes * Core Okta API * Rate Limits * Rate limit dashboard * Authn/End-user rate limits * Management rate limits * Other endpoint rate limits * Additional limits * Rate limit best practices * Client-based rate limits * DynamicScale * Previous rate limits * System Log events for rate limits * Error Codes * User query options * Sign in Your Users * Authentication * Identity Providers * OpenID Connect & OAuth 2.0 API * WebFinger * Manage Okta Objects * Administrator Roles * Apps * Authenticators Admin * Authorization Servers * Brands * CAPTCHAs * Devices * Domains * Dynamic Client Registration * Event Types * Factors * Features * Groups * Identity Sources * Key Management * Linked Objects * Log Streaming * Mappings * MyAccount * Org * Policy * Push Providers * Risk Events * Risk Providers * Schemas * Sessions * Subscriptions * System Log * Templates * ThreatInsight * Trusted Origins * UI Schema * User Types * Users * Zones * Advanced Server Access API * Introduction * ASA Attributes API * ASA Audits API * ASA Clients API * ASA Entitlements API * ASA Groups API * ASA Projects API * ASA Service Users API * ASA Teams API * ASA Users API * SCIM Protocol * SCIM V2.0 * SCIM V1.1 * Postman Collections * Hooks * Event Hooks Management API * Inline Hooks Management API * Inline Hook Types * Password Import Hook * Registration Hook * SAML Hook * Telephony Hook * Token Hook * User Import Hook * Hooks best practices * Okta Expression Language * Expression Language in Identity Engine * Release Life Cycle * Architecture Center * Case studies * CompanyX * Reference Architectures * Directory coexistence * Lab overview and prerequisites * Migrate users from Azure AD * Migrate users from an LDAP server * Migrate users from a generic database * Manage multiple Okta environments * Lab overview and prerequisites * Configure Terraform Cloud * Create resources * Rename a group * Deploy changes to production * Detect drift * Synchronize environments daily 1. References 2. Core Okta API 3. Event Types ON THIS PAGE Catalog Loading... EVENT TYPES Event types are the primary method of categorization within the Okta eventing platform. They allow consumers to easily group notable system occurrences based on behavior. This resource contains the complete event type catalog of this platform. CATALOG The following is a full listing of event types used in the System Log API with associated description and related metadata. For migration purposes it also includes a mapping to the equivalent event type in the legacy Events API. The relationship between System Log API and Events API event types is generally one-to-many. Note that there are currently some System Log API event types which do not have an Events API equivalent. > Important: As of April 20th, 2020, the Events API does not track new event > types added to the System Log API. For this reason we highly recommend > migrating to the System Log API. For more information, see our Events API End > of Life FAQ (opens new window). All Releases 2023.07.2 2023.06.1 2023.04.1 2023.04.0 2023.03.0 2023.02.2 2023.02.0 2023.01.2 2023.01.0 2022.12.0 2022.11.2 2022.11.1 2022.10.2 2022.10.0 2022.08.0 2022.07.0 2022.06.2 2022.06.0 2022.05.3 2022.05.1 2022.05.0 2022.04.3 2022.04.2 2022.02.0 2021.12.0 2021.11.0 2021.10.2 2021.10.0 2021.09.1 2021.08.0 2021.07.1 2021.07.0 2021.05.1 2021.04.2 2021.03.2 2021.02.2 2021.02.1 2021.01.2 2021.01.1 2021.01.0 2020.12.0 2020.10.4 2020.09.4 2020.09.3 2020.09.1 2020.08.4 2020.08.0 2020.07.1 2020.06.3 2020.06.1 2020.05.1 2020.05.0 2020.03.0 2020.02.0 2020.01.0 2019.12.0 2019.11.0 2019.09.0 2019.08.3 2019.08.0 2019.07.1 2019.07.0 2019.05.4 2019.05.0 2019.04.2 2019.04.0 2019.03.4 2019.03.3 2019.03.1 2019.03.0 2019.02.3 2019.02.2 2019.02.1 2019.01.2 2019.01.1 2018.47 2018.43 2018.42 2018.37 2018.36 2018.35 2018.32 2018.28 2018.25 2018.23 2018.22 2018.15 2018.13 2018.10 2018.08 2018.06 2018.05 2018.04 2018.03 2018.01 2017.52 2017.51 2017.50 2017.49 2017.48 2017.47 2017.45 2017.44 2017.43 2017.39 2017.33 2017.32 2017.29 2017.28 2017.27 2017.25 2017.24 2017.22 2017.20 2017.19 2017.15 2017.11 2017.06 2017.02 2017.01 2016.51 2016.50 2016.48 2016.45 2016.39 2016.33 2016.29 2016.27 2016.24 2016.20 2016.18 2016.15 2016.14 2016.13 2016.12 2016.11 2016.10 2016.09 2016.06 2016.05 2016.04 2016.02 2015.47 2014.25 2014.18 2011.01 Found 852 matches ANALYTICS.REPORTS.EXPORT.DOWNLOAD A user has downloaded an export file that Okta has generated for a report available in the admin console. This event may be used to identify access by a user to a report data set from Okta. This may be useful to audit access to report data for security investigations, compliance audits, and evaluation of the utility of a report within the Org. This event only indicates that a user has downloaded the export file. The user that downloaded it may not be the user that requested generation of the export file. See analytics.reports.export.request and analytics.reports.export.generate for related actions. Since: 2022.05.1 ANALYTICS.REPORTS.EXPORT.GENERATE Okta has generated an export file for a report available in the admin console. This event may be used to identify whether Okta successfully generated the export file that a user requested for a report. This event is primarily useful for troubleshooting if a report fails to generate. This event does not indicate whether a user downloaded the report file. See analytics.reports.export.request and analytics.reports.export.download for related actions. Since: 2022.05.1 ANALYTICS.REPORTS.EXPORT.REQUEST A user has requested that Okta generate an export file for a report available in the admin console. This event may be used to identify a request by a user to export a report data set from Okta. This may be useful to audit access to report data for security investigations, compliance audits, and evaluation of the utility of a report within the Org. This event only indicates that a user requested the export. It does not indicate that an export file was successfully generated by Okta nor that the export file was accessed by a user. See analytics.reports.export.generate and analytics.reports.export.download for those actions. Since: 2022.05.1 APP.ACCESS_REQUEST.APPROVER.APPROVE Legacy event types: app.access_request.approver.approve Request to access an app was approved by an administrator-defined approver. app-instance-requestevent-hook-eligible Since: 2017.43 APP.ACCESS_REQUEST.APPROVER.DENY Legacy event types: app.access_request.approver.deny Request to access an app was denied by an administrator-defined approver. app-instance-requestevent-hook-eligible Since: 2017.43 APP.ACCESS_REQUEST.DELETE Legacy event types: app.access_request.delete Request to access an app was deleted by an administrator. app-instance-requestevent-hook-eligible Since: 2017.43 APP.ACCESS_REQUEST.DENY Legacy event types: app.access_request.deny Request to access an app was denied after at least one approver denied the request. app-instance-requestevent-hook-eligible Since: 2017.43 APP.ACCESS_REQUEST.EXPIRE Legacy event types: app.access_request.expire Request to access an app expired by the system due to lack of approver action. app-instance-requestevent-hook-eligible Since: 2017.43 APP.ACCESS_REQUEST.GRANT Legacy event types: app.access_request.grant Request to access an app was granted after all approvers approved the request. app-instance-requestevent-hook-eligible Since: 2017.43 APP.ACCESS_REQUEST.REQUEST Legacy event types: app.access_request.request Request to access an app was performed by a user. app-instance-requestevent-hook-eligible Since: 2017.43 APP.AD.API.USER_IMPORT.ACCOUNT_LOCKED Legacy event types: app.ad.api.user_import.account_locked Active Directory user account set to locked following profile update: user is locked in active directory. ad-app Since: 2016.10 APP.AD.API.USER_IMPORT.WARN.SKIPPED_CONTACT.ATTRIBUTE_INVALID_VALUE Legacy event types: app.ad.api.user_import.warn.skipped_contact.attribute_invalid_value Skipping import of contact due to invalid attribute. Please consult with your Active Directory admin if you believe this contact should be imported. ad-app Since: 2015.47 APP.AD.API.USER_IMPORT.WARN.SKIPPED_USER.ATTRIBUTE_INVALID_VALUE Legacy event types: app.ad.api.user_import.warn.skipped_user.attribute_invalid_value Skipping import of user due to an invalid AD attribute. ad-app Since: 2015.47 APP.AD.API.USER_IMPORT.WARN.SKIPPED_USER.MISSING_REQUIRED_ATTRIBUTE Skipping import of user due to a required AD attribute being null. ad-app Since: 2011.01 APP.APP_INSTANCE.CSR.GENERATE Legacy event types: app.app_instance.csr.generate Certificate signing request (CSR) generated. app Since: 2017.15 APP.APP_INSTANCE.CSR.PUBLISH Legacy event types: app.app_instance.csr.publish Certificate signing request (CSR) published. app Since: 2017.15 APP.APP_INSTANCE.CSR.REVOKE Legacy event types: app.app_instance.csr.revoke Certificate signing request (CSR) revoked. app Since: 2017.15 APP.APP_INSTANCE.PROVISION_SYNC_JOB.COMPLETED Legacy event types: app.app_instance.provision_sync_job.completed Fired when a provision sync job has successfully completed. This can be used to confirm that a provision sync job has finished running and is no longer processing users. When fired, this event contains details about number of users processed in the job. Related events include app.app_instance.provision_sync_job.started and app.app_instance.provision_sync_job.failed. adminappuser-provision Since: 2019.08.3 APP.APP_INSTANCE.PROVISION_SYNC_JOB.FAILED Legacy event types: app.app_instance.provision_sync_job.failed Fired when a provision sync job has failed. This can be used to identify when a provision sync job has failed. When fired, this event contains information about the reason the provision sync job failed. Related events include app.app_instance.provision_sync_job.started and app.app_instance.provision_sync_job.completed. adminappuser-provision Since: 2019.08.3 APP.APP_INSTANCE.PROVISION_SYNC_JOB.STARTED Legacy event types: app.app_instance.provision_sync_job.started Fired when a provision sync job has successfully started. This can be used to confirm that a provision sync job has successfully started. Related events include app.app_instance.provision_sync_job.completed and app.app_instance.provision_sync_job.failed. adminappuser-provision Since: 2019.08.3 APP.AUDIT_REPORT.DOWNLOAD.LOCAL.ACTIVE Legacy event types: app.audit_report.download.local.active Application access report downloaded. app Since: 2017.52 APP.AUDIT_REPORT.DOWNLOAD.LOCAL.DEPROV Legacy event types: app.audit_report.download.local.deprov Recent unassignments report downloaded. app Since: 2017.52 APP.AUDIT_REPORT.DOWNLOAD.ROGUE.REPORT Legacy event types: app.audit_report.download.rogue.report Rogue report downloaded. app Since: 2017.52 APP.GENERIC.UNAUTH_APP_ACCESS_ATTEMPT Legacy event types: app.generic.unauth_app_access_attempt User attempted unauthorized access to app. app Since: 2016.06 APP.INBOUND_DEL_AUTH.LOGIN_SUCCESS Legacy event types: app.inbound_del_auth.login_success Successful inbound delegated authentication request for user. delegated-auth Since: 2016.18 APP.KERBEROS_RICH_CLIENT.ACCOUNT_NOT_FOUND Legacy event types: app.kerberos_rich_client.account_not_found Kerberos based rich client authentication failed: Could not find Office 365 app user for the AD user with principal id. appkerberos-rich-client Since: 2017.50 APP.KERBEROS_RICH_CLIENT.INSTANCE_NOT_FOUND Legacy event types: app.kerberos_rich_client.instance_not_found Kerberos based rich client authentication failed: Unknown app instance id. appkerberos-rich-client Since: 2017.50 APP.KERBEROS_RICH_CLIENT.MULTIPLE_ACCOUNTS_FOUND Legacy event types: app.kerberos_rich_client.multiple_accounts_found Kerberos based rich client authentication failed: Multiple users with username found. appkerberos-rich-client Since: 2017.50 APP.KERBEROS_RICH_CLIENT.USER_AUTHENTICATION_SUCCESSFUL Legacy event types: app.kerberos_rich_client.user_authentication_successful Kerberos based rich client authentication successful for Office 365 user. appkerberos-rich-client Since: 2017.52 APP.KEYS.CLONE Legacy event types: app.keys.clone_legacy Application signing key cloned. app Since: 2017.25 APP.KEYS.GENERATE Legacy event types: app.keys.generate_legacy New signing key generated. app Since: 2017.25 APP.KEYS.ROTATE Legacy event types: app.keys.rotate_legacy Application signing key rotated. app Since: 2017.25 APP.LDAP.PASSWORD.CHANGE.FAILED Legacy event types: app.ldap.password.change.failed Password change failed. ldap-app Since: 2014.18 APP.OAUTH2.ADMIN.CONSENT.GRANT Legacy event types: app.oauth2.admin.consent.grant_success Administrator consent granted for scope. This event can be used to track when an administrator grants consent to a client to request a specific scope. This event is fired when an admin grants consent. oauth2oauth2-as-runtimeoauth2-org-as Since: 2019.12.0 APP.OAUTH2.ADMIN.CONSENT.REVOKE Legacy event types: app.oauth2.admin.consent.revoke_success Administrator consent revoked for scope. This event can be used to track when an administrator revokes consent to a client to request a specific scope. This event is fired when an admin revokes consent. oauth2oauth2-as-runtimeoauth2-org-as Since: 2019.12.0 APP.OAUTH2.API_RESOURCE.CREATE OAuth2 API Resource is created. Manage and audit lifecycle events of API resources. Administrators are made aware that a new API resource is getting created under Authorization servers. oauth2oauth2-api-resource Since: 2022.04.2 APP.OAUTH2.API_RESOURCE.DELETE OAuth2 API Resource is deleted. Manage and audit lifecycle events of API resources. Administrators are made aware that a new API resource is getting deleted under Authorization servers. oauth2oauth2-api-resource Since: 2022.04.2 APP.OAUTH2.API_RESOURCE.UPDATE OAuth2 API Resource is updated. Manage and audit lifecycle events of API resources. Administrators are made aware that a new API resource is getting updated under Authorization servers. oauth2oauth2-api-resource Since: 2022.04.2 APP.OAUTH2.AS.AUTHORIZE Legacy event types: app.oauth2.as.authorize_failure OAuth2 authorization request. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.AUTHORIZE.CODE Legacy event types: app.oauth2.as.authorize.code_success OAuth2 authorization code request. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.AUTHORIZE.IMPLICIT.ACCESS_TOKEN Legacy event types: app.oauth2.as.authorize.implicit.access_token_success OAuth2 authorization implicit access token request. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.AUTHORIZE.IMPLICIT.ID_TOKEN Legacy event types: app.oauth2.as.authorize.implicit.id_token_success OAuth2 authorization implicit ID token request. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.AUTHORIZE.SCOPE_DENIED Legacy event types: app.oauth2.as.authorize.scope_denied_failure Some of the requested scopes were denied by the policy. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.GRANT Legacy event types: app.oauth2.as.consent.grant_failure, app.oauth2.as.consent.grant_success User granted consent to app. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.REVOKE Legacy event types: app.oauth2.as.consent.revoke_failure, app.oauth2.as.consent.revoke_success Consent revoked. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.REVOKE.IMPLICIT.AS Legacy event types: app.oauth2.as.consent.revoke.implicit.as_success All consent revoked for authorization server. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.REVOKE.IMPLICIT.CLIENT Legacy event types: app.oauth2.as.consent.revoke.implicit.client_success All consent revoked for client. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.REVOKE.IMPLICIT.SCOPE Legacy event types: app.oauth2.as.consent.revoke.implicit.scope_success All consent revoked for scope. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.REVOKE.IMPLICIT.USER Legacy event types: app.oauth2.as.consent.revoke.implicit.user_success Consent for all scopes revoked for user. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.REVOKE.USER Legacy event types: app.oauth2.as.consent.revoke.user_failure, app.oauth2.as.consent.revoke.user_success All consent revoked for user. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.CONSENT.REVOKE.USER.CLIENT Legacy event types: app.oauth2.as.consent.revoke.user.client_failure, app.oauth2.as.consent.revoke.user.client_success User consent revoked for client. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.EVALUATE.CLAIM Legacy event types: app.oauth2.as.evaluate.claim_failure Claim evaluation for OAuth2 token. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.INTERACT.INTERACTION_CODE Fired when interaction code is generated by OIE. This event can be used by administrators to audit interaction_code generation, and troubleshoot why the IdX transaction has failed. When fired, this event contains hashed values of the interaction_code and interaction_handle, as well as information about the client to which they were issued. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2021.01.0 APP.OAUTH2.AS.INTERACT.INTERACTION_HANDLE Fired when interaction handle is generated by OIE. This event can be used by administrators to detect if additional interaction is required and an interaction handle has been issued. When fired this event contains interaction handle hash and the client to which it was issued. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2021.01.0 APP.OAUTH2.AS.KEY.ROLLOVER Legacy event types: app.oauth2.as.key.rollover.legacy Custom Authorization Server token signing key rolled over. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.TOKEN.DETECT_REUSE Legacy event types: app.oauth2.as.token.detect_reuse Detect one-time refresh token attempted reuse. This event can be used by administrators to detect and audit attempted reuse of one-time refresh tokens. When fired this event contains information about the user, client to which the refresh token was minted, and the hash of the refresh tokens. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2020.09.3 APP.OAUTH2.AS.TOKEN.GRANT Legacy event types: app.oauth2.as.token.grant_failure OAuth2 token request. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.TOKEN.GRANT.ACCESS_TOKEN Legacy event types: app.oauth2.as.token.grant.access_token_success OAuth2 access token is granted. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.TOKEN.GRANT.DEVICE_SECRET Legacy event types: app.oauth2.as.token.grant.device_secret_success Grant an OAuth2 device_secret for the Native SSO flow. This event adds tracking to let admins know when Native SSO is being used to protect desktop or mobile apps. When fired this event contains the device secret id which administrators can use to correlate with single logout events across native desktop apps. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2021.04.2 APP.OAUTH2.AS.TOKEN.GRANT.ID_TOKEN Legacy event types: app.oauth2.as.token.grant.id_token_success OAuth2 id token is granted. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.TOKEN.GRANT.REFRESH_TOKEN Legacy event types: app.oauth2.as.token.grant.refresh_token_success OAuth2 refresh token is granted. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AS.TOKEN.REVOKE Legacy event types: app.oauth2.as.token.revoke_failure, app.oauth2.as.token.revoke_success OAuth2 token revocation request. oauth2oauth2-as-runtimeoauth2-custom-as Since: 2016.14 APP.OAUTH2.AUTHORIZE Legacy event types: app.oauth2.authorize_failure OIDC authorization request. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.AUTHORIZE.CODE Legacy event types: app.oauth2.authorize.code_success OIDC authorization code request. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.AUTHORIZE.IMPLICIT.ACCESS_TOKEN Legacy event types: app.oauth2.authorize.implicit.access_token_success OIDC authorization implicit access token request. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.AUTHORIZE.IMPLICIT.ID_TOKEN Legacy event types: app.oauth2.authorize.implicit.id_token_success OIDC authorization implicit ID token request. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.CLIENT.LIFECYCLE.ACTIVATE Legacy event types: app.oauth2.client.lifecycle.activate Activate OAuth client. oauth2oauth2-clientoauth2-client-lifecycle Since: 2017.24 APP.OAUTH2.CLIENT.LIFECYCLE.CREATE Legacy event types: app.oauth2.client.lifecycle.create Create OAuth client. oauth2oauth2-clientoauth2-client-lifecycle Since: 2017.24 APP.OAUTH2.CLIENT.LIFECYCLE.DEACTIVATE Legacy event types: app.oauth2.client.lifecycle.deactivate Deactivate OAuth client. oauth2oauth2-clientoauth2-client-lifecycle Since: 2017.24 APP.OAUTH2.CLIENT.LIFECYCLE.DELETE Legacy event types: app.oauth2.client.lifecycle.delete Delete OAuth client. oauth2oauth2-clientoauth2-client-lifecycle Since: 2017.24 APP.OAUTH2.CLIENT.LIFECYCLE.UPDATE Legacy event types: app.oauth2.client.lifecycle.update Update OAuth client. oauth2oauth2-clientoauth2-client-lifecycle Since: 2017.24 APP.OAUTH2.CLIENT.PRIVILEGE.GRANT An OAuth 2.0 client app's admin privileges changed. This can be used to audit the provisioning of admin privileges for OAuth 2.0 client apps. When fired, this event contains information about the type of admin privileges the OAuth 2.0 client app currently has. Related events include: APP_OAUTH2_CLIENT_PRIVILEGE_REVOKE. event-hook-eligibleoauth2oauth2-client Since: 2023.04.1 APP.OAUTH2.CLIENT.PRIVILEGE.REVOKE All privileges for OAuth 2.0 client app were revoked. This can be used to audit the deprovisioning of admin privileges from OAuth 2.0 client apps. When fired, this event indicates the OAuth 2.0 client app has no more admin privileges. All of OAuth 2.0 client app's privileges were revoked. Related events include: APP_OAUTH2_CLIENT_PRIVILEGE_GRANT. event-hook-eligibleoauth2oauth2-client Since: 2023.04.1 APP.OAUTH2.CLIENT_ID_RATE_LIMIT_WARNING Legacy event types: app.oauth2.client_id_rate_limit_warning Fired when requests from a single client id has consumed majority of an org's rate limit on the OAuth2 endpoint. This event can be used by admins to discover and deactivate a rogue client. The admin is able to manage the client via the Syslog UI. When fired, this event contains information about the responsible client id. As of release, this event is fired when a single client id consumes 90% of an org's OAuth2 rate limit; this threshold is subject to change. oauth2oauth2-client Since: 2019.04.2 APP.OAUTH2.CONSENT.GRANT User granted consent to app. This event can be used to identify the org AS consent grant. When fired, the event contains information about the successful consent grant by org AS. oauth2oauth2-as-runtimeoauth2-org-as Since: 2021.10.2 APP.OAUTH2.CREDENTIALS.LIFECYCLE.ACTIVATE OAuth client credentials (either client secret or JWK) is added for an application. Use this event to find out if an application has a new client secret or private/public key that has been added. This could be used to audit changes made to client credentials. oauth2oauth2-clientoauth2-client-credentials-lifecycle Since: 2022.05.3 APP.OAUTH2.CREDENTIALS.LIFECYCLE.CREATE OAuth client credentials (either client secret or JWK) is activated for an application. Use this event to find out if an application has activated a new client secret or private/public key. This could be used to audit changes made to client credentials. oauth2oauth2-clientoauth2-client-credentials-lifecycle Since: 2022.05.3 APP.OAUTH2.CREDENTIALS.LIFECYCLE.DEACTIVATE OAuth client credentials (either client secret or JWK) is deactivated for an application. Use this event to find out if an application has an existing client secret or private/public key that has been deactivated. This could be used to audit changes made to client credentials. oauth2oauth2-clientoauth2-client-credentials-lifecycle Since: 2022.05.3 APP.OAUTH2.CREDENTIALS.LIFECYCLE.DELETE OAuth client credentials (either client secret or JWK) is deleted for an application. Use this event to find out if an application has an existing client secret or private/public key that has been deleted. This could be used to audit changes made to client credentials. oauth2oauth2-clientoauth2-client-credentials-lifecycle Since: 2022.05.3 APP.OAUTH2.INTERACT.INTERACTION_CODE Fired when interaction code is generated by OIE. This event can be used by administrators to audit interaction_code generation, and troubleshoot why the IdX transaction has failed. When fired, this event contains hashed values of the interaction_code and interaction_handle, as well as information about the client to which they were issued. oauth2oauth2-as-runtimeoauth2-org-as Since: 2021.01.0 APP.OAUTH2.INTERACT.INTERACTION_HANDLE Fired when interaction handle is generated by OIE. This event can be used by administrators to detect if additional interaction is required and an interaction handle has been issued. When fired this event contains interaction handle hash and the client to which it was issued. oauth2oauth2-as-runtimeoauth2-org-as Since: 2021.01.0 APP.OAUTH2.INVALID_CLIENT_CREDENTIALS Legacy event types: app.oauth2.invalid_client_credentials_failure Multiple requests with invalid client credentials for client id. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.INVALID_CLIENT_IDS Legacy event types: app.oauth2.invalid_client_ids_failure Multiple requests with invalid client ids. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.KEY.ROLLOVER Legacy event types: app.oauth2.key.rollover.legacy Org Authorization Server token signing key rolled over. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.SIGNON Legacy event types: app.oauth2.signon_failure, app.oauth2.signon_success User performed OIDC single sign on to app. oauth2oauth2-client Since: 2016.14 APP.OAUTH2.TOKEN.DETECT_REUSE Legacy event types: app.oauth2.token.detect_reuse Detect one-time refresh token attempted reuse. This event can be used by administrators to detect and audit attempted reuse of one-time refresh tokens. When fired this event contains information about the user, client to which the refresh token was minted, and the hash of the refresh tokens. oauth2oauth2-as-runtimeoauth2-org-as Since: 2020.09.3 APP.OAUTH2.TOKEN.GRANT Legacy event types: app.oauth2.token.grant_failure OIDC token request. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TOKEN.GRANT.ACCESS_TOKEN Legacy event types: app.oauth2.token.grant.access_token_success OIDC access token is granted. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TOKEN.GRANT.ID_TOKEN Legacy event types: app.oauth2.token.grant.id_token_success OIDC id token is granted. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TOKEN.GRANT.REFRESH_TOKEN Legacy event types: app.oauth2.token.grant.refresh_token_success OIDC refresh token is granted. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TOKEN.REVOKE Legacy event types: app.oauth2.token.revoke_failure, app.oauth2.token.revoke_success OIDC token revocation request. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TOKEN.REVOKE.IMPLICIT.AS Legacy event types: app.oauth2.token.revoke.implicit.as_success Tokens revoked for authorization server. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TOKEN.REVOKE.IMPLICIT.CLIENT Legacy event types: app.oauth2.token.revoke.implicit.client_success Tokens revoked for client. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TOKEN.REVOKE.IMPLICIT.USER Legacy event types: app.oauth2.token.revoke.implicit.user_success Tokens revoked for user. oauth2oauth2-as-runtimeoauth2-org-as Since: 2016.14 APP.OAUTH2.TRUSTED_SERVER.ADD Trusted authorization server is added. Administrators can use this event to debug and audit trusted authorization server operations. When fired, this event contains the authorization server IDs of the servers involved. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2023.02.0 APP.OAUTH2.TRUSTED_SERVER.DELETE Trusted authorization server is removed. Administrators can use this event to debug and audit trusted authorization server operations. When fired, this event contains the authorization server IDs of the servers involved. event-hook-eligibleoauth2oauth2-as-runtimeoauth2-custom-as Since: 2023.02.0 APP.OFFICE365.API.CHANGE.DOMAIN.FEDERATION.SUCCESS Legacy event types: app.office365.api.change.domain.federation.success Successfully updated the domain federation from old settings to new settings. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.AD.USER Legacy event types: app.office365.api.error.ad.user User is assigned to more than one instance of Active Directory, could not set Immutable ID. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.CHECK.USER.EXISTS Legacy event types: app.office365.api.error.check.user.exists Could not determine status of Office 365 user, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.CREATE.USER Legacy event types: app.office365.api.error.create.user Could not create user in Office 365, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.DEACTIVATE.USER Legacy event types: app.office365.api.error.deactivate.user Could not deactivate Office 365 user, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.DOWNLOAD.CUSTOM.OBJECTS Legacy event types: app.office365.api.error.download.custom.objects Could not download group/role/license data for your Office 365 instance, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.DOWNLOAD.GROUPS Legacy event types: app.office365.api.error.download.groups Could not download all groups from your Office 365 instance, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.DOWNLOAD.USERS Legacy event types: app.office365.api.error.download.users Could not download all users from your Office 365 instance, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.ENDPOINT.UNAVAILABLE Legacy event types: app.office365.api.error.endpoint.unavailable Unable to reach the Office 365 endpoint. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GET.COMPANY.DIRSYNC.FAILURE Legacy event types: app.office365.api.error.get.company.dirsync.failure Unable to read Office 365 directory sync for the company, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GET.COMPANY.DIRSYNC.STATUS.FAILURE Legacy event types: app.office365.api.error.get.company.dirsync.status.failure Unable to provision user to Office 365, because 'Directory Sync' value in Azure Active Directory is unsupported. Please visit the Azure Active Directory portal and set 'Directory Sync' state to Activated and retry. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GET.COMPANY.DIRSYNC.STATUS.PENDING Legacy event types: app.office365.api.error.get.company.dirsync.status.pending Unable to provision user to Office 365, because 'Directory Sync' value in Azure Active Directory not yet in Activated state. This may take up to 72 hours. Please visit the Azure Active Directory portal and retry when in Activated state. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GET.OBJECT.IDS.BY.GROUP.ID Legacy event types: app.office365.api.error.get.object.ids.by.group.id Could not get users by group id from your Office 365 instance, received error. office365-app Since: 2018.37 APP.OFFICE365.API.ERROR.GROUP.CREATE.FAILURE Legacy event types: app.office365.api.error.group.create.failure Could not create Office 365 group, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.CREATE.FAILURE.NAME.IN.USE Legacy event types: app.office365.api.error.group.create.failure.name.in.use Could not create Office 365 group because the name is already in use, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.DELETE.FAILURE Legacy event types: app.office365.api.error.group.delete.failure Could not delete Office 365 group, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.MEMBERSHIP.UPDATE.ASSIGNMENT.FAILURE Legacy event types: app.office365.api.error.group.membership.update.assignment.failure Could not update the Office 365 group membership because of an error assigning a user to the group, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.MEMBERSHIP.UPDATE.FAILURE Legacy event types: app.office365.api.error.group.membership.update.failure Could not update the Office 365 group membership, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.MEMBERSHIP.UPDATE.GROUP.NOT.FOUND.FAILURE Legacy event types: app.office365.api.error.group.membership.update.group.not.found.failure Could not update the Office 365 group membership because the group could not be found, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.MEMBERSHIP.UPDATE.REMOVAL.FAILURE Legacy event types: app.office365.api.error.group.membership.update.removal.failure Could not update the Office 365 group membership because of an error removing a user from the group, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.UPDATE.FAILURE Legacy event types: app.office365.api.error.group.update.failure Could not update Office 365 group, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.GROUP.UPDATE.FAILURE.NOT.FOUND Legacy event types: app.office365.api.error.group.update.failure.not.found Could not update Office 365 group because it was not found, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.IMPORT.PROFILE Legacy event types: app.office365.api.error.import.profile Could not import profile for Office 365 user, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.NO.ENDPOINTS.FOUND Legacy event types: app.office365.api.error.no.endpoints.found No Office 365 endpoint found to send our request. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.PUSH.PASSWORD Legacy event types: app.office365.api.error.push.password Could not push password for Office 365 user, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.PUSH.PROFILE Legacy event types: app.office365.api.error.push.profile Could not push profile for Office 365 user, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.REACTIVATE.USER Legacy event types: app.office365.api.error.reactivate.user Could not reactivate Office 365 user, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.REMOVE.DOMAIN.FEDERATION.FAILURE Legacy event types: app.office365.api.error.remove.domain.federation.failure Unable to remove the domain federation, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.REMOVE.DOMAIN.FEDERATION.FAILURE.ACCESS.DENIED Legacy event types: app.office365.api.error.remove.domain.federation.failure.access.denied Unable to remove the domain federation because the admin user is not authorized to perform the task. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.REMOVE.DOMAIN.FEDERATION.FAILURE.DOMAIN.NOT.FOUND Legacy event types: app.office365.api.error.remove.domain.federation.failure.domain.not.found Unable to remove the domain federation because the specified domain was not found. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.REVOKE.REFRESH.TOKEN Legacy event types: app.office365.api.error.revoke.refresh.token Failed to revoke refresh tokens for user. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SET.COMPANY.DIRSYNC.FAILURE Legacy event types: app.office365.api.error.set.company.dirsync.failure Unable to enable Office 365 directory sync for the company, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SET.COMPANY.DIRSYNC.STATUS.FAILURE Legacy event types: app.office365.api.error.set.company.dirsync.status.failure Unable to enable Office 365 directory sync for the company, because 'Directory Sync' value in Azure Active Directory is unsupported. Please visit the Azure Active Directory portal and set 'Directory Sync' state to Activated. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SET.DOMAIN.FEDERATION.FAILURE Legacy event types: app.office365.api.error.set.domain.federation.failure Unable to setup the domain federation, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SET.DOMAIN.FEDERATION.FAILURE.ACCESS.DENIED Legacy event types: app.office365.api.error.set.domain.federation.failure.access.denied Unable to setup the domain federation because the admin user is not authorized to perform the task. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SET.DOMAIN.FEDERATION.FAILURE.DOMAIN.DEFAULT Legacy event types: app.office365.api.error.set.domain.federation.failure.domain.default Unable to setup the domain federation because the specified domain is the default domain. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SET.DOMAIN.FEDERATION.FAILURE.DOMAIN.NOT.FOUND Legacy event types: app.office365.api.error.set.domain.federation.failure.domain.not.found Unable to setup the domain federation because the specified domain was not found. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SYNC.CONTACT Legacy event types: app.office365.api.error.sync.contact Failed to sync contact, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SYNC.FINALIZE Legacy event types: app.office365.api.error.sync.finalize Failed to finalize export to Office 365, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SYNC.GROUP Legacy event types: app.office365.api.error.sync.group Failed to sync group, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SYNC.NOT.ACTIVATED Legacy event types: app.office365.api.error.sync.not.activated Sync could not execute because Office 365 directory sync for the company not yet Activated. Sync will retry after a period of time. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SYNC.SET.ATTRIBUTE Legacy event types: app.office365.api.error.sync.set.attribute Failed to set attribute, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.SYNC.USER Legacy event types: app.office365.api.error.sync.user Failed to sync user, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.UNABLE.TO.CREATE.GRAPH.CLIENT Legacy event types: app.office365.api.error.unable.to.create.graph.client An error occurred while creating the Azure Active Directory Graph API client. Please try the last operation again. If this error persists, please contact Okta support. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.VALIDATE.ADMIN.CREDS Legacy event types: app.office365.api.error.validate.admin.creds User does not have the Company Administrator role. Please try again with a user which has this role. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.VALIDATE.CREDS Legacy event types: app.office365.api.error.validate.creds Could not validate your Office 365 credentials, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.VALIDATE.CREDS.UNKNOWN.EXCEPTION Legacy event types: app.office365.api.error.validate.creds.unknown.exception Could not communicate with Office 365 to validate your credentials, received error. appoffice365-app Since: 2017.01 APP.OFFICE365.API.ERROR.X-MS-FORWARDED-CLIENT-IP-HEADER.ABSENT Legacy event types: app.office365.api.error.x-ms-forwarded-client-ip-header.absent X-MS-Forwarded-Client-IP header either empty or not found in the request. appoffice365-app Since: 2017.01 APP.OFFICE365.API.REMOVE.DOMAIN.FEDERATION.SUCCESS Legacy event types: app.office365.api.remove.domain.federation.success Successfully removed the domain federation. appoffice365-app Since: 2017.01 APP.OFFICE365.API.SET.DOMAIN.FEDERATION.SUCCESS Legacy event types: app.office365.api.set.domain.federation.success Successfully set up the domain federation with new settings. appoffice365-app Since: 2017.01 APP.OFFICE365.API.SYNC.COMPLETE Legacy event types: app.office365.api.sync.complete User sync completed. appoffice365-app Since: 2017.01 APP.OFFICE365.API.SYNC.HEARTBEAT.SENT Legacy event types: app.office365.api.sync.heartbeat.sent Heartbeat sent to Microsoft Azure Active Directory. appoffice365-app Since: 2017.01 APP.OFFICE365.API.SYNC.JOB.COMPLETE Legacy event types: app.office365.api.sync.job.complete Sync job completed. appoffice365-app Since: 2017.01 APP.OFFICE365.API.SYNC.JOB.COMPLETE.CONTACT Legacy event types: app.office365.api.sync.job.complete.contact Sync job completed. appoffice365-app Since: 2017.01 APP.OFFICE365.API.SYNC.JOB.COMPLETE.GROUP Legacy event types: app.office365.api.sync.job.complete.group Sync job completed. appoffice365-app Since: 2017.01 APP.OFFICE365.API.SYNC.JOB.COMPLETE.USER Legacy event types: app.office365.api.sync.job.complete.user Sync job completed. appoffice365-app Since: 2017.01 APP.OFFICE365.CLIENTPLATFORM.CONVERSION.JOB.PROCESSING.APP.INSTANCE Legacy event types: app.office365.clientplatform.conversion.job.processing.app.instance Begin processing client access conversion for app instance. appoffice365-app Since: 2017.01 APP.OFFICE365.CLIENTPLATFORM.CONVERSION.JOB.SKIPPING.MIGRATION Legacy event types: app.office365.clientplatform.conversion.job.skipping.migration Skipping migration of client access rules for app instance. appoffice365-app Since: 2017.01 APP.OFFICE365.DIRSYNC.SKIPPING.CONFLICT-OBJECT Legacy event types: app.office365.dirsync.skipping.conflict-object Skipping sync of conflict object. appoffice365-app Since: 2017.01 APP.OFFICE365.DIRSYNC.SKIPPING.CRITICAL-SYSTEM-OBJECT Legacy event types: app.office365.dirsync.skipping.critical-system-object Skipping sync of critical system object. appoffice365-app Since: 2017.01 APP.OFFICE365.DIRSYNC.SKIPPING.NON-SECURITY-GROUP-INVALID-MAIL Legacy event types: app.office365.dirsync.skipping.non-security-group-invalid-mail Skipping sync of non security object with invalid mail. appoffice365-app Since: 2017.01 APP.OFFICE365.DIRSYNC.SKIPPING.RESERVED-ATTRIBUTE-VALUE Legacy event types: app.office365.dirsync.skipping.reserved-attribute-value Skipping sync of object with reserved attribute value. appoffice365-app Since: 2017.01 APP.OFFICE365.DIRSYNC.SKIPPING.SYSTEMMAILBOX Legacy event types: app.office365.dirsync.skipping.systemmailbox Skipping sync of system mailbox object. appoffice365-app Since: 2017.01 APP.OFFICE365.DIRSYNC.SKIPPING.WITHOUT-NAME-AND-DISPLAYNAME Legacy event types: app.office365.dirsync.skipping.without-name-and-displayname Skipping sync of non security object without name and display name. appoffice365-app Since: 2017.01 APP.OFFICE365.ERROR.IMPORTING.USER Legacy event types: app.office365.error.importing.user An error occurred while importing user. appoffice365-app Since: 2017.01 APP.OFFICE365.GRAPH.API.ERROR.NO.MAILBOX.FOUND Legacy event types: app.office365.graph.api.error.no.mailbox.found No MailBox found for Office 365 user. appoffice365-app Since: 2017.01 APP.OFFICE365.GRAPH.API.ERROR.RATE-LIMIT.EXCEEDED Legacy event types: app.office365.graph.api.error.rate-limit.exceeded Rate limit exceeded for Microsoft Graph. appoffice365-app Since: 2017.01 APP.OFFICE365.GRAPH.API.ERROR.SERVICE.PRINCIPAL.CREATION.FAILED Legacy event types: app.office365.graph.api.error.service.principal.creation.failed Failure while trying to create service principal. office365-app Since: 2017.01 APP.OFFICE365.GRAPH.API.ERROR.SERVICE.PRINCIPAL.MSGRAPH.AUTHENTICATION.FAILURE Legacy event types: app.office365.graph.api.error.service.principal.msgraph.authentication.failure Failure while trying to create service principal due to a Mircrosoft Graph authentication issue. office365-app Since: 2017.01 APP.OFFICE365.SERVICE.PRINCIPAL.CLEANUP.JOB.COMPLETE Legacy event types: app.office365.service.principal.cleanup.job.complete End processing Office 365 service principal cleanup. appoffice365-app Since: 2017.01 APP.OFFICE365.SERVICE.PRINCIPAL.CLEANUP.JOB.INVALID.CREDENTIALS Legacy event types: app.office365.service.principal.cleanup.job.invalid.credentials The admin username or password is invalid. Please use the Azure Active Directory cmdlets to execute the command 'Remove-MsolServicePrincipal -AppPrincipalId' to manually cleanup the service principal. appoffice365-app Since: 2017.01 APP.OFFICE365.SERVICE.PRINCIPAL.CLEANUP.JOB.PROCESSING Legacy event types: app.office365.service.principal.cleanup.job.processing Begin performing Office 365 service principal cleanup. appoffice365-app Since: 2017.01 APP.OFFICE365.SERVICE.PRINCIPAL.CLEANUP.JOB.SKIPPING.MISSING.CREDS Legacy event types: app.office365.service.principal.cleanup.job.skipping.missing.creds Skipping app instance during Office 365 service principal cleanup as it does not contain Office 365 admin user credentials. Please use the Azure Active Directory cmdlets to execute the command 'Remove-MsolServicePrincipal -AppPrincipalId' to manually cleanup the service principal. appoffice365-app Since: 2017.01 APP.OFFICE365.SERVICE.PRINCIPAL.CLEANUP.JOB.SKIPPING.NO.SERVICE.PRINCIPAL Legacy event types: app.office365.service.principal.cleanup.job.skipping.no.service.principal Skipping app instance during Office 365 service principal cleanup as it does not have a service principal. appoffice365-app Since: 2017.01 APP.OFFICE365.SERVICE.PRINCIPAL.CLEANUP.JOB.UNABLE.TO.DELETE.SERVICE.PRINCIPAL Legacy event types: app.office365.service.principal.cleanup.job.unable.to.delete.service.principal Unable to automatically delete the Office 365 service principal. Please use the Azure Active Directory cmdlets to execute the command 'Remove-MsolServicePrincipal -AppPrincipalId' to manually cleanup the service principal. appoffice365-app Since: 2017.01 APP.OFFICE365.USER.DELETE.SUCCESS Legacy event types: app.office365.user.delete.success Successfully deleted the Office 365 user. appoffice365-app Since: 2017.01 APP.OFFICE365.USER.LIFECYCLE.ACTION.FAILED Legacy event types: app.office365.user.lifecycle.action.failed Unable to complete app user lifecycle action for AppUser. appoffice365-app Since: 2017.01 APP.OFFICE365.USER.REMOVE.LICENSES.SUCCESS Legacy event types: app.office365.user.remove.licenses.success Successfully removed all the licenses for the Office 365 user. appoffice365-app Since: 2017.01 APP.POLICY.SIGN_ON.UPDATE Update app sign on policy. This event is used to audit when an app sign on policy is updated. This event is fired when an admin updates an app's sign on policy and logs what was changed. policy Since: 2022.08.0 APP.RADIUS.AGENT.LISTENER.FAILED Radius agent listener failed. appradius Since: 2018.13 APP.RADIUS.AGENT.LISTENER.SUCCEEDED Radius agent listener succeeded. appradius Since: 2018.13 APP.RADIUS.AGENT.PORT_INACCESSIBLE Legacy event types: app.radius.agent.port_inaccessible Radius agent failed to listen on port. appradius Since: 2018.13 APP.RADIUS.AGENT.PORT_REACCESSIBLE Legacy event types: app.radius.agent.port_reaccessible Radius agent was able to listen on port again. appradius Since: 2018.13 APP.RADIUS.INFO_ACCESS.NO_PERMISSION No permission accessing any Radius app info. This event can be used to monitor and notify admins when some users who access radius app info have no permission. Fired when users who access radius app info have no permission. appradius Since: 2020.08.0 APP.RADIUS.INFO_ACCESS.PARTIAL_PERMISSION No permission accessing info for part of Radius apps. This event can be used to monitor and notify admins when some users who access radius app info have only partial permission. Fired when users who access radius app info have partial permission. appradius Since: 2020.08.0 APP.REALTIMESYNC.IMPORT.DETAILS.ADD_USER Legacy event types: app.realtimesync.import.details.add_user Real time sync added new User. app Since: 2014.25 APP.REALTIMESYNC.IMPORT.DETAILS.DELETE_USER Legacy event types: app.realtimesync.import.details.delete_user Real time sync removed existing User. app Since: 2014.25 APP.REALTIMESYNC.IMPORT.DETAILS.UPDATE_USER Legacy event types: app.realtimesync.import.details.suspend_user, app.realtimesync.import.details.unsuspend_user, app.realtimesync.import.details.update_user Fired when a real time import includes an update to an existing user. This can be used to see details about the user updates included in a real time sync import. When fired, this event contains information about the type of update made, including whether or not a user was suspend or unsuspended. Related events include: app.realtimesync.import.details_add_user and app.realtimesync.import.details_delete_user. app Since: 2014.25 APP.RUM.CONFIG.VALIDATION.ERROR Legacy event types: app.rum.config.validation.error Error validating instance configuration. Can be used to identify configuration issues with remote user management. rum Since: 2018.42 APP.RUM.IS.API.ACCOUNT.ERROR Legacy event types: app.rum.is.api.account.error RUM API account is not configured or empty. Can be used to identify RUM API account configuration issues. rum Since: 2018.42 APP.RUM.PACKAGE.THROWN.ERROR Legacy event types: app.rum.package.thrown.error Errors during execution. Can be used to identify any errors during execution of remote user management. rum Since: 2018.42 APP.RUM.VALIDATION.ERROR Legacy event types: app.rum.validation.error Error during package validation. Can be used to identify validation issues with remote user management packages. rum Since: 2018.42 APP.SAML.SENSITIVE.ATTRIBUTE.UPDATE Legacy event types: app.saml.sensitive.attribute.update Fired when a SAML assertion contains a sensitive attribute, and that sensitive attribute has been updated (modified/added/deleted). This event does not fire when non-sensitive SAML attributes are updated. This can be used to audit that a sensitive attribute attached to an outbound SAML assertion has been correctly modified, added, or deleted. When fired, this event contains the specific attributes that have been modified, added, or deleted to/from the SAML assertion. Related events include: application.lifecycle.update. appcvd Since: 2019.01.1 APP.USER_MANAGEMENT Legacy event types: app.user_management.app_group_member_import.delete_failure, app.user_management.app_group_member_import.delete_success, app.user_management.app_group_member_import.insert_failure, app.user_management.app_group_member_import.insert_success Imported new or deleted existing member of an application group. app-user-management Since: 2016.04 APP.USER_MANAGEMENT.GROUPPUSH.MAPPING.CREATED.FROM.RULE Legacy event types: app.user_management.grouppush.mapping.created.from.rule A Group Push mapping to the group has been created from the rule. app Since: 2017.51 APP.USER_MANAGEMENT.GROUPPUSH.MAPPING.CREATED.FROM.RULE.ERROR.DUPLICATE Legacy event types: app.user_management.grouppush.mapping.created.from.rule.error.duplicate A Group Push mapping to the group did not get created from rule because an existing mapping already existed. app Since: 2017.51 APP.USER_MANAGEMENT.GROUPPUSH.MAPPING.CREATED.FROM.RULE.ERROR.VALIDATION Legacy event types: app.user_management.grouppush.mapping.created.from.rule.error.validation A Group Push mapping to the group did not get created from rule because of the validation error. app Since: 2017.51 APP.USER_MANAGEMENT.GROUPPUSH.MAPPING.CREATED.FROM.RULE.ERRORS Legacy event types: app.user_management.grouppush.mapping.created.from.rule.errors A Group Push mapping to the group did not get created from rule. app Since: 2017.51 APP.USER_MANAGEMENT.GROUPPUSH.MAPPING.OKTA.USERS.IGNORED Legacy event types: app.user_management.grouppush.mapping.okta.users.ignored Okta users ignored while pushing group to AppInstance. appapp-user-management Since: 2018.03 APP.USER_MANAGEMENT.IMPORT.CSV.LINE.ERROR Legacy event types: app.user_management.import.csv.line.error Error reading line from CSV. app Since: 2017.51 APP.USER_MANAGEMENT.PUSH_NEW_USER_SUCCESS Legacy event types: app.user_management.push_new_user_success Successfully pushed new user account to app. app Since: 2017.51 APP.USER_MANAGEMENT.UPDATE_FROM_MASTER_FAILED Legacy event types: app.user_management.update_from_master_failed Could not apply import. app Since: 2017.51 APP.USER_MANAGEMENT.USER_GROUP_IMPORT.CREATE_FAILURE Legacy event types: app.user_management.user_group_import.create_failure Failed to create group from app. appapp-user-management Since: 2018.03 APP.USER_MANAGEMENT.USER_GROUP_IMPORT.DELETE_SUCCESS Legacy event types: app.user_management.user_group_import.delete_success Deleted the group from app. appapp-user-management Since: 2018.03 APP.USER_MANAGEMENT.USER_GROUP_IMPORT.UPDATE_FAILURE Legacy event types: app.user_management.user_group_import.update_failure Failed to update group from app. appapp-user-management Since: 2018.03 APP.USER_MANAGEMENT.USER_GROUP_IMPORT.UPSERT_FAIL Legacy event types: app.user_management.user_group_import.upsert_failure Failed to import the group from app. This event helps identify when a group is failed to be imported. Fired when we skip processing an import of a group. appapp-user-management Since: 2020.07.1 APP.USER_MANAGEMENT.USER_GROUP_IMPORT.UPSERT_SUCCESS Legacy event types: app.user_management.user_group_import.upsert_success Imported the group from app. appapp-user-management Since: 2018.03 APPLICATION.APPUSER.MAPPING.INVALID.EXPRESSION Legacy event types: application.appuser.mapping.invalid.expression App user property mapping has invalid expressions. Can be used to identify invalid expressions. Note that a single event is fired for all invalid expressions. app Since: 2018.47 APPLICATION.CACHE.INVALIDATE Legacy event types: invalidate_app_list.app.created, invalidate_app_list.app.updated, invalidate_app_list.app_details.updated, invalidate_app_list.metadata.changed Event fired when a app list cache is invalidated because a new app is created. Can be used to make sure App List cache is invalidated after a new app is created. invalidate-app-list-cache Since: 2018.42 APPLICATION.CONFIGURATION.DETECT_ERROR Legacy event types: app.app_instance.config-error Application configuration error detected. app Since: 2016.13 APPLICATION.CONFIGURATION.DISABLE_DELAUTH_OUTBOUND Legacy event types: app.app_instance.outbound_delauth_disabled Disable delegated authentication for app. app Since: 2016.13 APPLICATION.CONFIGURATION.DISABLE_FED_BROKER_MODE Legacy event types: app.generic.config.fed_broker_mode_disabled Disable Federation Broker Mode for app. app Since: 2017.24 APPLICATION.CONFIGURATION.ENABLE_DELAUTH_OUTBOUND Legacy event types: app.app_instance.outbound_delauth_enabled Enable delegated authentication for app. app Since: 2016.13 APPLICATION.CONFIGURATION.ENABLE_FED_BROKER_MODE Legacy event types: app.generic.config.fed_broker_mode_enabled Enable Federation Broker Mode for app. app Since: 2017.24 APPLICATION.CONFIGURATION.IMPORT_SCHEMA Legacy event types: app.api.error.download_app_schema, app.google.user_management.error.download_app_schema, app.jira.api.error.download.server.set.values, app.okta_org2org.user_management.error.download_app_schema, app.okta_org2org.user_management.error.download_user_type, app.okta_org2org.user_management.error.parse_schema, app.okta_org2org.user_management.error.schema.property.not.exist, app.salesforce.user_management.failure.download_user_schema, app.servicenow.api.error.get.costcenters, app.servicenow.api.error.get.departments, app.servicenow.api.error.get.locations, app.servicenow_app2.api.error.get.costcenters, app.servicenow_app2.api.error.get.departments, app.servicenow_app2.api.error.get.locations, app.veeva_vault.api.error.download.custom.objects, app.workday.api.error.user-management-error-download-app-schema Okta couldn't download application configuration. Can be used to identify when an app schema couldn't be downloaded from a remote application. Event fired when Okta couldn't download application-specific data from a remote app. This may happen when admin updates provisioning details. app-api Since: 2017.33 APPLICATION.CONFIGURATION.RESET_LOGO Legacy event types: app.app_instance.logo_reset Reset app logo. app Since: 2016.13 APPLICATION.CONFIGURATION.UPDATE Legacy event types: app.api.error.api.validation, app.api.error.download_custom_objects, app.api.error.download_schema_enum_values, app.api.generic.configuration.message, app.boxnet.api.error.validate_parent_folder, app.google.user_management.error.download_custom_objects, app.hipchat.api.error.validation, app.jira.api.error.binding, app.jira.api.error.login, app.jira.api.error.logout, app.netsuite.api.error.download_custom_objects, app.rightscale.api.error.validate, app.sendwordnow.api.error.auth, app.workday.api.error.validate, app.zendesk.api.error.role.restriction, verificationFailed Okta couldn't verify api credentials. Can be used when Okta couldn't check the credentials by execution some custom, application dependent, set of requests. Okta fires this event to notify issues with credentials validation. Could be issues with proper permissions as well. app-api Since: 2017.33 APPLICATION.CONFIGURATION.UPDATE_API_CREDENTIALS_FOR_PASS_CHANGE Legacy event types: app.user_management.updating_api_credentials_for_password_change Update API credentials due to user updating password. app Since: 2016.13 APPLICATION.CONFIGURATION.UPDATE_LOGO Legacy event types: app.app_instance.logo_update Change app logo. app Since: 2016.13 APPLICATION.CONFIGURATION.UPDATE_RATE_LIMITS Update rate limits for an OAuth App. This can be used to track the updates to rate limits for an OAuth application. When fired, this event contains details about the actor, who triggered the event, the OAuth app, for which the rate limit was updated, etc. Actual value change details can be found in debug data such as the old and new values. app Since: 2023.01.0 APPLICATION.INTEGRATION.API_QUERY Legacy event types: app.hipchat.api.error.query Unable to query remote API. Can be used to determine when okta fails to query remote application. Okta fires this event for unspecified events which include remote api response processing. app-api Since: 2017.33 APPLICATION.INTEGRATION.AUTHENTICATION_FAILURE Legacy event types: app.api.error.auth, app.api.error.oauth.get.token, app.api.error.oauth.refresh.token, app.auth_error.INVALID_CREDENTIALS, app.bigmachines.api.error.connection, app.bigmachines.api.error.login, app.bigmachines.api.error.logout, app.bloomfire.api.error.api.validation, app.bloomfire.sso.error.api_key_empty, app.bloomfire.sso.error.api_key_invalid, app.bloomfire.sso.error.user_not_extracted, app.confluence.api.error.login, app.confluence.api.error.logout, app.cornerstone.api.error.api.validation, app.cornerstone.api.error.init, app.coupa.api.connection.error, app.crashplanpro.api.auth.invalid_login_url, app.crashplanpro.api.invalid_set_of_roles, app.docusign.api.error.no.accounts, app.docusign.api.error.not.account.member, app.dropbox.api.error.validation, app.echosign.api.error.connection, app.egnyte.auth.type.validation.failure, app.egnyte.username.validation.failure, app.evernote_business.api.error.validation, app.gotomeeting.user_management.config.failure.api_login_failure, app.gotomeeting_rest.user_management.config.failure.api_auth_failed, app.netsuite.api.error.auth, app.pagerduty.api.auth.error.invalid.admin.role, app.pagerduty.api.auth.error.invalid.admin.username, app.pagerduty.api.auth.error.invalid.api.key, app.postini.user_management.config.failure.api_login_failed, app.rightscale.api.error.login, app.salesforce.user_management.failure.api_service_not_available, app.salesforce.user_management.failure.general_api_login_failure, app.salesforce.user_management.failure.invalid_api_credentials, app.salesforce.user_management.failure.password_expired, app.servicenow.api.error.validation, app.servicenow_app2.api.error.validation, app.sugarcrm.api.error.login, app.sugarcrm.api.error.logout, app.veeva_vault.api.error.validation, app.yammer.api.error.validation, app.zendesk.api.error.validation.error, github.api.error.empty_oauth_token, github.api.error.not_a_member_of_the_org, github.api.error.not_admin_user Error authenticating. Can be used when Okta couldn't authenticate with the provided credentials to a remote api. Okta fires this event when it couldn't access a remote api with provided credentials. app-api Since: 2017.33 APPLICATION.INTEGRATION.GENERAL_FAILURE Legacy event types: app.amazon_aws.connected.accounts.modification, app.api.error.generic, app.bloomfire.api.error.generic, app.coupa.api.error, app.crashplanpro.api.rest.unexpected_response_status, app.eqanalyzer.url.encoding, app.exacttarget.api.error.init, app.google.sso.failure.domain_not_found, app.google.sso.failure.invalid_continue_url, app.google.sso.failure.invalid_domain, app.google.sso.failure.relay_state_not_found, app.gotomeeting.user_management.config.failure.api_not_available, app.gotomeeting.user_management.config.failure.api_url_is_malformed, app.gotomeeting_rest.user_management.config.failure.api_not_available, app.rightscale.api.error.idp, app.scim.is.api.account.error, app.sugarcrm.api.error.get.entry.list, app.sugarcrm.api.error.hash.password, app.sugarcrm.api.error.set.entry, app.workday.api.error.bind, roambi.api.error.auth.empty.account.response, roambi.api.error.auth.empty.code, roambi.api.error.auth.unexpected.response Generic error occured. Can be used when there is some uncategorized error occurs. Okta fires this event for different unhandled exceptions. app-api Since: 2017.33 APPLICATION.INTEGRATION.RATE_LIMIT_EXCEEDED Legacy event types: app.api.error.rate.limit.exceeded, app.boxnet.api.error.rate_limit_exceeded, app.clarizen.api.error.rate_limit.exceeded, app.dropbox.api.error.rateLimit.exceeded, app.egnyte.rate.limiting.exceeded, app.google.user_management.error.rateLimit, app.hipchat.rateLimit.exceeded, app.litmos.import.rate_limit_exceeded, github.api.error.rate_limit.remaining, github.api.error.rate_limit.reset_date API rate limit exceeded. Can be used when Okta reaches api calls/minute rate limit. Okta fires this event when there are too many requests for a specific customer. app-api Since: 2017.33 APPLICATION.INTEGRATION.TRANSFER_FILES Legacy event types: app.boxnet.api.error.transfer.files Unable to transfer files. Can be used when Okta fails to transfer files from one user to another. Okta fires this event when it fails to process user-to-user file transfers. app-api Since: 2017.33 APPLICATION.LIFECYCLE.ACTIVATE Legacy event types: app.generic.config.app_activated Activate application. appevent-hook-eligible Since: 2016.13 APPLICATION.LIFECYCLE.CREATE Legacy event types: app.app_editor.app.create Create application. appevent-hook-eligible Since: 2016.13 APPLICATION.LIFECYCLE.DEACTIVATE Legacy event types: app.generic.config.app_deactivated Deactivate application. appevent-hook-eligible Since: 2016.13 APPLICATION.LIFECYCLE.DELETE Legacy event types: app.generic.config.app_deleted Delete application. appevent-hook-eligible Since: 2016.13 APPLICATION.LIFECYCLE.UPDATE Legacy event types: app.app_editor.app.update, app.generic.config.app_updated Update application. appevent-hook-eligible Since: 2016.13 APPLICATION.POLICY.SIGN_ON.DENY_ACCESS Legacy event types: app.app_instance.sign_on_policy.access_denied Deny user access due to app sign on policy. When fired due to app assurance being evaluated as unsatisfiable (the policy requirements could not be satisfied by the users' current set of available authenticator enrollments), this event contains information about the user and the app that the user is trying to authenticate into. appevent-hook-eligible Since: 2016.13 APPLICATION.POLICY.SIGN_ON.RULE.CREATE Legacy event types: app.app_instance.sign_on_policy.new_rule Create rule for app sign on policy. app Since: 2016.13 APPLICATION.POLICY.SIGN_ON.RULE.DELETE Legacy event types: app.app_instance.sign_on_policy.delete_rule Delete rule from app sign on policy. app Since: 2016.13 APPLICATION.POLICY.SIGN_ON.UPDATE Legacy event types: app.app_instance.sign_on_policy.change Update app sign on policy. app Since: 2016.13 APPLICATION.PROVISION.FIELD_MAPPING_RULE.CHANGE Legacy event types: platform.field_mapping_rule.assign.change, platform.field_mapping_rule.import.change Event fired when field mapping rules modified. Can be used to make sure when custom mapping rules are modified. field-mapping-rule-modification Since: 2018.42 APPLICATION.PROVISION.GROUP.ADD Legacy event types: app.api.error.create.group, app.api.error.upsert_group, app.api.error.upsert_group_duplicate, app.boxnet.api.error.create.group, app.confluence.api.error.create.new.group, app.google.user_management.error.create_group, app.google.user_management.error.create_group_duplicate, app.jira.api.error.create.group, app.jira.api.error.upsert.group, app.samanage.api.error.long_group_name, app.servicenow_app2.api.error.upsert.group Fired when Okta provisions a new group on a remote application. Can be used to identify when Okta provisions a group on a remote application. Event fired when the group provisioning failed for any reason. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP.IMPORT Legacy event types: app.api.error.download_groups, app.api.error.get_group_by_id, app.boxnet.api.error.download.groups, app.confluence.api.error.parse.groups, app.google.user_management.error.download_groups, app.jira.api.error.download.groups, app.rightscale.api.error.download.groups, app.servicenow_app2.api.error.download.groups, app.workday.api.error.get-groups, app.workday.api.error.parse-groups Fired when Okta downloads a remote group. Can be used to identify when Okta tries to download remote group details. Event fired when Okta fails to reach the group detail from a remote application. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP.REMOVE Legacy event types: app.api.error.delete_group, app.boxnet.api.error.delete.group, app.confluence.api.error.remove.group, app.google.user_management.error.delete_group, app.jira.api.error.delete.group, app.servicenow_app2.api.error.delete.group Fired when Okta removes a remote group. Can be used to identify when a group has been unassigned. Event fired when Okta failed to delete group from remote application. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP.UPDATE Legacy event types: app.api.error.group_name_long_length, app.api.error.update.group, app.boxnet.api.error.update.group, app.clarizen.api.error.update_group, app.google.user_management.error.update_group, app.jira.api.error.update.group Fired when Okta updates the user group. Can be used to identify when a group has been updated. Event fired when Okta fails to update a remote group for any reason. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP.VERIFY_EXISTS Legacy event types: app.api.error.check_group_exists, app.api.error.group.more_than_one_with_same_id, app.api.error.group.not_found, app.boxnet.api.error.check_group_exists, app.confluence.api.error.check.group.exists, app.google.user_management.error.check_group_exists, app.google.user_management.error.check_group_exists.invalid_domain, app.jira.api.error.check.group.exists, app.servicenow_app2.api.warn.upsert.group Fired when group no longer exists on a remote application. Can be used to identify when a group no longer exists on a remote application. Event fired when group push enhancement enabled and there is no group found on update or delete. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP_MEMBERSHIP.ADD Legacy event types: app.api.error.add_group_membership, app.boxnet.api.error.push.groups_set, app.confluence.api.error.add.user.to.group, app.google.user_management.error.add_member_to_group, app.servicenow_app2.api.error.add.group.memberships Failed to assign a user to a group. Can be used when Okta failed to assign user to a group on remote application. Okta fires this event if there are any issues while provision a membership to a remote application. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP_MEMBERSHIP.IMPORT Legacy event types: app.api.error.download_memberships, app.boxnet.api.error.download.group_users, app.google.user_management.error.download_group_members, app.servicenow_app2.api.error.download.group.memberships, app.workday.api.error.get-group-assignments, app.workday.api.error.parse-group-assignments Error while downloading memberships. Can be used when Okta failed to download users and groups relationships. Okta fires this event if there are any issues while importing a membership from a remote application. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP_MEMBERSHIP.REMOVE Legacy event types: app.api.error.remove_group_membership, app.boxnet.api.error.push.remove_from_groups, app.confluence.api.error.remove.user.to.group, app.google.user_management.error.remove_member_from_group, app.servicenow_app2.api.error.delete.group.memberships Fired when there is an error while removing user(s) from group. Can be used when Okta failed to unassign user from a group on remote application. Okta fires this event when there are any issues while provision a membership to a remote application. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP_MEMBERSHIP.UPDATE Legacy event types: app.api.error.update_group_membership, app.jira.api.error.update.group.membership, app.salesforce.user_management.failure.add_user_to_public_group, app.salesforce.user_management.failure.remove_user_from_public_group Fired when there is an error while updating user group membership for group. Can be used when Okta failed to push updated memberships to a remote application. Okta fires this event when couldn't update memberships on a remote application. Could be user removal/addition. app-api Since: 2017.33 APPLICATION.PROVISION.GROUP_PUSH.ACTIVATE_MAPPING Legacy event types: platform.group_push.activate_mapping Group push activated mappings. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.DELETE_APPGROUP Legacy event types: platform.group_push.delete_appgroup Group push deleted application group. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.AND.GROUPS.DELETED.RULE.DELETED Legacy event types: app.user_management.grouppush.mapping.and.groups.deleted.rule.deleted An existing mapping and its target groups have been deleted because a mapping rule was deleted. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.APP.GROUP.RENAMED Legacy event types: app.user_management.grouppush.mapping.app.group.renamed A mapped app group has been renamed because the source group was renamed. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.APP.GROUP.RENAMED.FAILED Legacy event types: app.user_management.grouppush.mapping.app.group.renamed.failed A mapped app group couldn't be renamed when the source group was renamed. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.CREATED Legacy event types: app.user_management.grouppush.mapping.created A new mapping has been created. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.CREATED.FROM.RULE.WARNING.DUPLICATE.NAME Legacy event types: app.user_management.grouppush.mapping.created.from.rule.warning.duplicate.name A new mapping from a rule was not created due to a duplicate group name. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.CREATED.FROM.RULE.WARNING.DUPLICATE.NAME.TOBECREATED Legacy event types: app.user_management.grouppush.mapping.created.from.rule.warning.duplicate.name.tobecreated A new mapping from a rule was not created due to another mapping will be created that has the same user group name. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.CREATED.FROM.RULE.WARNING.UPSERTGROUP.DUPLICATE.NAME Legacy event types: app.user_management.grouppush.mapping.created.from.rule.warning.upsertGroup.duplicate.name An upsert to a group caused group push rule re-evaluation. A new mapping from a rule was not created due to a duplicate group name. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.DEACTIVATED.SOURCE.GROUP.RENAMED Legacy event types: app.user_management.grouppush.mapping.deactivated.source.group.renamed An existing mapping has been deactivated because the source group was renamed. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.DEACTIVATED.SOURCE.GROUP.RENAMED.FAILED Legacy event types: app.user_management.grouppush.mapping.deactivated.source.group.renamed.failed An existing mapping couldn't be deactivated when the source group was renamed. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.UPDATE.OR.DELETE.FAILED Legacy event types: app.user_management.grouppush.mapping.update.or.delete.failed Group push mapping change failed and will be retried. Can be used to identify transient errors that may temporarily impact the group push mapping but likely do not require admin intervention. This event typically requires no action as the corresponding operation will be retried. Refer to application.provision.group_push.mapping.update.or.delete.failed for events that may require intervention. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.MAPPING.UPDATE.OR.DELETE.FAILED.WITH.ERROR Legacy event types: app.user_management.grouppush.mapping.update.or.delete.failed.with.error Group push mapping change failed and cannot be retried. Can be used to identify group push mapping errors which may require admin intervention to address. Unlike the similarly named event, application.provision.group_push.mapping.update.or.delete.failed, when this event is fired the corresponding action that triggered it will not be retried by Okta and may indicate a configuration problem. For example, invalid authorization credentials with the target application due to an expired password or invalid access token. appevent-hook-eligible Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.PUSH_MEMBERSHIPS Legacy event types: platform.group_push.push_memberships Group push pushed memberships. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.PUSHED Legacy event types: app.user_management.grouppush.pushed A group was pushed to an app. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.REMOVED Legacy event types: app.user_management.grouppush.removed A group was removed from an app. app Since: 2017.29 APPLICATION.PROVISION.GROUP_PUSH.UPDATED Legacy event types: app.user_management.grouppush.updated A group was updated in an app. app Since: 2017.29 APPLICATION.PROVISION.INTEGRATION.CALL_API Legacy event types: app.amazon_aws.api.error.get.roles, app.rum.execution.security.exception, app.rum.execution.standard.attributes.exception, app.rum.failure.timeout.reschedule Application integration API called. app-api Since: 2016.15 APPLICATION.PROVISION.USER.ACTIVATE Legacy event types: app.api.error.activate_user, app.user_management.activate_user Activate user's application membership. app-api Since: 2016.14 APPLICATION.PROVISION.USER.DEACTIVATE Legacy event types: app.api.error.deactivate_user, app.bigmachines.api.error.deactivate, app.boxnet.api.error.deactivate_user, app.clarizen.api.error.entity.not_found, app.confluence.api.error.deactivate.user, app.confluence.api.error.remove.user, app.cornerstone.api.error.api.deactivate_user, app.dropbox.api.error.deactivation, app.evernote_business.api.error.deactivation, app.exacttarget.api.error.deactivate_user, app.google.user_management.error.deactivate_user, app.hipchat.api.error.deactivation, app.netsuite.api.error.deactivate_user, app.pagerduty.api.deactivate.user.unexpected.status, app.servicenow.api.error.deactivate.user, app.servicenow_app2.api.error.deactivate.user, app.sugarcrm.api.error.deactivate.user, app.user_management.deactivate_user, app.user_management.deactivate_user.api_account, app.user_management.deactivate_user_failed, app.veeva_vault.api.error.deactivate.user, app.yammer.api.error.deactivation, roambi.api.error.deactivate_user.confirmation Push user deactivation to external application. app-api Since: 2016.14 APPLICATION.PROVISION.USER.DEPROVISION Legacy event types: app.user_management.deprovision_task_complete Deprovision user from external application. app Since: 2016.14 APPLICATION.PROVISION.USER.IMPORT Legacy event types: app.api.error.download_users, app.bloomfire.api.error.download_users, app.boxnet.api.error.download.users, app.confluence.api.error.download.users, app.dropbox.api.error.download.users, app.echosign.api.error.download.users, app.exacttarget.api.error.download_users, app.google.user_management.error.download_org_units, app.google.user_management.error.download_users, app.gotomeeting.user_management.config.failure.user_import, app.gotomeeting_rest.user_management.config.failure.user_import, app.hipchat.api.error.download.users, app.jira.api.error.download.users, app.netsuite.api.error.download_users, app.postini.user_management.failure.download_users, app.rightscale.api.error.download.users, app.salesforce.user_management.failure.user_import, app.sendwordnow.api.error.service, app.servicenow.api.error.download.users, app.servicenow_app2.api.error.download.users, app.sugarcrm.api.error.download.users, app.veeva_vault.api.error.download.users, app.workday.api.error.connect-custom-report, app.workday.api.error.custom-report-unknown-failure, app.workday.api.error.get-locations, app.workday.api.error.get-tx-logs, app.workday.api.error.get-worker-by-username, app.workday.api.error.get-workers, app.workday.api.error.minimum-concurrent-connections, app.workday.api.error.parse-custom-report, app.workday.api.error.parse-workers, app.workday.api.error.timezone-deactivations-processing-errors, app.workday.api.error.universal-directory-setup-error, app.workday.api.get-custom-report-data-empty, app.yammer.api.error.download.users, gooddata.api.error.project.access.forbidden Deactivate user from external application. app-api Since: 2017.33 APPLICATION.PROVISION.USER.IMPORT_PROFILE Legacy event types: app.api.error.import_user_by_id, app.api.error.import_user_profile, app.bigmachines.api.error.import, app.boxnet.api.error.import.user.profile, app.confluence.api.error.convert.remote.user.to.app.user, app.confluence.api.error.get.user, app.confluence.api.error.get.user.groups, app.confluence.api.error.import.user.profile, app.cornerstone.api.error.api.import_profile, app.crashplanpro.api.user_not_found, app.docusign.api.error.import.inactive.user, app.docusign.api.error.import.permission.profile, app.dropbox.api.error.import.profile, app.dropbox.api.error.query, app.echosign.api.error.import.profile, app.exacttarget.api.error.import_user_profile, app.google.user_management.error.import_user_profile, app.hipchat.api.error.import.profile, app.jira.api.error.check.get.user, app.jira.api.error.convert.remote.user.to.app.user, app.jira.api.error.import.user.profile, app.netsuite.api.error.import_user_profile, app.rightscale.api.error.get.users, app.sendwordnow.api.error.get_user, app.sendwordnow.api.error.import_user_profile, app.servicenow.api.error.import.user.profile, app.servicenow_app2.api.error.import.manager.profile, app.servicenow_app2.api.error.import.user.profile, app.sugarcrm.api.error.import.user.profile, app.veeva_vault.api.error.import.user.profile, app.workday.api.error.get-worker-by-id, app.yammer.api.error.import.profile Import profile from external application. app-api Since: 2017.33 APPLICATION.PROVISION.USER.PASSWORD Legacy event types: app.api.error.empty_password, app.api.error.push_password_update, app.confluence.api.error.push.password.update, app.cornerstone.api.error.api.password_push, app.dropbox.api.error.push.password.update, app.exacttarget.api.error.push_password_update, app.google.user_management.error.push_password_update, app.hipchat.api.error.push.password, app.jira.api.error.push.password.update, app.netsuite.api.error.push_password_update, app.salesforce.user_management.failure.cant.push.password, app.salesforce.user_management.sso.only.user.password.rejected, app.servicenow.api.error.push.password.update, app.servicenow_app2.api.error.push.password.update, app.sugarcrm.api.error.push.password.update Issue pushing user password to external application. app-api Since: 2017.33 APPLICATION.PROVISION.USER.PUSH Legacy event types: app.api.error.create_pending_user, app.api.error.create_user, app.api.error.user.not_found, app.api.error.user.not_found_or_deleted, app.bigmachines.api.error.create, app.bloomfire.api.error.create_user, app.boxnet.api.error.assign_folder_permissions, app.boxnet.api.error.create_new_user, app.boxnet.api.error.create_personal_folder, app.boxnet.api.error.create_personal_folder.conflict, app.boxnet.api.error.invalid_user_login, app.boxnet.api.error.personal_folder_name, app.boxnet.api.error.personal_folder_sync_state, app.confluence.api.error.create.new.user, app.cornerstone.api.error.api.create_user, app.dropbox.api.error.create.user, app.echosign.api.error.create, app.evernote_business.api.error.create.user, app.evernote_business.api.error.create.user.limit.reached, app.exacttarget.api.error.create_user, app.google.user_management.error.create_new_user, app.google.user_management.error.invalid_manager, app.google.user_management.error.invalid_orgunit_id, app.gotomeeting.user_management.config.failure.user_provisioning, app.gotomeeting_rest.user_management.config.failure.user_provisioning, app.hipchat.api.error.create.user, app.jira.api.error.create.new.user, app.netsuite.api.error.create_user, app.postini.user_management.config.failure.provisioning, app.rightscale.api.error.create.user, app.salesforce.user_management.failure.provisioning, app.samanage.api.error.incorrect.attribute, app.sendwordnow.api.error.create_user, app.servicenow.api.error.create.new.user, app.servicenow_app2.api.error.create.new.user, app.sugarcrm.api.error.create.new.user, app.user_management.push_new_user, app.user_management.push_pending_user, app.veeva_vault.api.error.create.new.user, app.yammer.api.error.create.user, app.yammer.api.warn.send.invite, gooddata.api.error.incorrect.roles.count, gooddata.api.error.project.assignment.failed, gooddata.api.error.project.not.found Push new user to external application. app-api Since: 2016.14 APPLICATION.PROVISION.USER.PUSH_OKTA_PASSWORD Legacy event types: app.user_management.push_okta_password_update Push user's Okta password to application. app Since: 2016.14 APPLICATION.PROVISION.USER.PUSH_PASSWORD Legacy event types: app.user_management.push_unique_password_update Push user's password to application. app Since: 2016.14 APPLICATION.PROVISION.USER.PUSH_PROFILE Legacy event types: app.api.error.manager.not_found_for_user, app.api.error.push_profile_update, app.bigmachines.api.error.profile.update, app.boxnet.api.error.add.email.alias, app.boxnet.api.error.push.profile.update, app.boxnet.api.error.user.push.conflict_in_group, app.confluence.api.error.convert.app.user.to.remote.user, app.confluence.api.error.push.profile.update, app.cornerstone.api.error.api.push_profile, app.crashplanpro.api.user_has_invalid_fields, app.docusign.api.error.update.inactive.user, app.docusign.api.error.update.permission.profile, app.dropbox.api.error.push.profile, app.dropbox.api.error.set.user.permissions, app.exacttarget.api.error.push_profile_update, app.generic.user_management.error.add_manager_to_user, app.google.api.error.InsufficientPermission, app.google.license_management.error.assign_license, app.google.license_management.error.remove_license, app.google.role_management.error.assign_role, app.google.role_management.error.remove_role, app.google.user_management.error.push_profile_update, app.google.user_management.error.reconcile_email_aliases, app.hipchat.api.error.push.profile, app.jira.api.error.convert.app.user.to.remote.user, app.jira.api.error.push.profile.update, app.netsuite.api.error.push_profile_update, app.pagerduty.api.push.profile.update.unexpected.status, app.rightscale.api.error.push.profile, app.sendwordnow.api.error.update_user_profile, app.servicenow.api.error.import.manager.profile, app.servicenow.api.error.push.profile.update, app.servicenow_app2.api.error.push.profile.update, app.sugarcrm.api.error.push.profile.update, app.user_management.provision_user.user_inactive, app.user_management.push_profile_failure, app.user_management.push_profile_success, app.user_management.push_profile_update, app.veeva_vault.api.error.push.profile.update, app.workday.api.error.get-employee-personal-info, app.workday.api.error.update-employee-personal-info, app.workday.api.error.user-management-error-push-profile-update, app.yammer.api.error.push.profile, moveit_dmz.error.too.long.username.or.email Push user's profile to external application. app-api Since: 2016.14 APPLICATION.PROVISION.USER.REACTIVATE Legacy event types: app.api.error.reactivate_user, app.bigmachines.api.error.activate, app.boxnet.api.error.reactivate_user, app.confluence.api.error.reactivate.user, app.cornerstone.api.error.api.reactivate_user, app.exacttarget.api.error.reactivate_user, app.google.user_management.error.reactivate_user, app.hipchat.api.error.reactivation, app.netsuite.api.error.reactivate_user, app.servicenow.api.error.reactivate.user, app.servicenow_app2.api.error.reactivate.user, app.sugarcrm.api.error.reactivate.user, app.user_management.reactivate_user, app.veeva_vault.api.error.reactivate.user, roambi.api.error.reactivate_user.confirmation Push user reactivation in external application. app-api Since: 2016.14 APPLICATION.PROVISION.USER.SYNC Legacy event types: app.user_management.provision_user, app.user_management.provision_user_failed Sync user in external application. appevent-hook-eligible Since: 2016.14 APPLICATION.PROVISION.USER.VERIFY_EXISTS Legacy event types: app.api.error.check_user_exists, app.api.error.user.more_than_one_with_same_id, app.bigmachines.api.error.check.user.exists, app.bloomfire.api.error.check_user_exists, app.boxnet.api.error.check_user_exists, app.confluence.api.error.check.user.exists, app.cornerstone.api.error.api.check_user_exists, app.crashplanpro.api.ambiguous_search_results_by_user, app.dropbox.api.error.check.user, app.echosign.api.error.search.by.id, app.echosign.api.error.search.by.login, app.exacttarget.api.error.check_user_exists, app.google.user_management.error.check_user_exists, app.google.user_management.error.check_user_exists.invalid_domain, app.hipchat.api.error.check.user, app.jira.api.error.check.user.exists, app.netsuite.api.error.check_user_exists, app.sendwordnow.api.error.user_exists, app.servicenow.api.error.check.user.exists, app.servicenow_app2.api.error.check.user.exists, app.sugarcrm.api.error.check.user.exists, app.user_management.verified_user_with_thirdparty, app.veeva_vault.api.error.check.user.exists, app.yammer.api.error.check.user, github.api.error.user_not_found Verify user exists in external application. app-api Since: 2016.14 APPLICATION.REGISTRATION_POLICY.LIFECYCLE.CREATE Legacy event types: app.registration_policy.lifecycle.create Create registration policy. app Since: 2017.52 APPLICATION.REGISTRATION_POLICY.LIFECYCLE.UPDATE Legacy event types: app.registration_policy.lifecycle.update Update registration policy. app Since: 2017.52 APPLICATION.USER_MEMBERSHIP.ADD Legacy event types: app.generic.provision.assign_user_to_app Add user to application membership. event-hook-eligibleuser-provision Since: 2016.02 APPLICATION.USER_MEMBERSHIP.APPROVE Legacy event types: app.generic.provision.approve_user_for_app User approved for application (assigned by not provisioned). user-provision Since: 2016.33 APPLICATION.USER_MEMBERSHIP.CHANGE_PASSWORD Legacy event types: app.generic.config.app_password_update Change application password for user. appevent-hook-eligible Since: 2016.11 APPLICATION.USER_MEMBERSHIP.CHANGE_USERNAME Legacy event types: app.generic.config.app_username_update Change user's application username. app Since: 2016.02 APPLICATION.USER_MEMBERSHIP.DEPROVISION Legacy event types: app.generic.provision.deprovision_user_from_app User deprovisioned from application (was previously revoked). user-provision Since: 2016.33 APPLICATION.USER_MEMBERSHIP.PROVISION Legacy event types: app.generic.provision.provision_user_for_app User provisioned to application (was previously approved). user-provision Since: 2016.33 APPLICATION.USER_MEMBERSHIP.REMOVE Legacy event types: app.generic.provision.deactivate_user_from_app Remove user's application membership. event-hook-eligibleuser-provision Since: 2016.02 APPLICATION.USER_MEMBERSHIP.RESTORE Legacy event types: app.generic.reversibility.individual.app.recovery, app.generic.reversibility.personal.app.recovery Restore user assignment to an application. app Since: 2016.02 APPLICATION.USER_MEMBERSHIP.RESTORE_PASSWORD Legacy event types: app.generic.reversibility.credentials.recovery Restore user's password for an application. app Since: 2016.02 APPLICATION.USER_MEMBERSHIP.REVOKE Legacy event types: app.generic.provision.revoke_user_from_app User revoked from application (unassigned but not yet deprovisioned). user-provision Since: 2016.33 APPLICATION.USER_MEMBERSHIP.SHOW_PASSWORD Legacy event types: app.generic.show.password Show user's password for application. app Since: 2016.02 APPLICATION.USER_MEMBERSHIP.UPDATE Legacy event types: app.generic.config.app_user_property_update Updated user application property. app Since: 2016.02 CORE.CONCURRENCY.ORG.LIMIT.VIOLATION Legacy event types: core.concurrency.org.limit.violation Too many requests in flight. concurrency-limit Since: 2017.39 CORE.EL.EVALUATE Legacy event types: core.el.evaluate_failure Evaluate Expression Language. okta-el Since: 2017.20 CORE.USER_AUTH.IDP.X509.CRL_DOWNLOAD_FAILURE Legacy event types: core.user_auth.idp.x509.crl_download_failure Failed to download CRL from the endpoint. x509-idp-auth Since: 2017.52 CREDENTIAL.REGISTER Legacy event types: credential.register Fired when a credential is registered. This event fires when the registration of a credential is successful or fails. This can be used to audit that a credential has been successfully registered, and troubleshoot why a credential registration attempt has failed. user-factor Since: 2019.02.3 CREDENTIAL.REVOKE Legacy event types: credential.revoke Fired when a credential is revoked. This event fires when the revocation of a credential is successful or fails. This can be used to audit that a credential has been successfully revoked, and troubleshoot why a credential revocation attempt has failed. user-factor Since: 2019.02.3 DEVICE.CUSTOM_PUSH.SEND_NOTIFICATION Fired when a Push notification sent to a device for custom app. Used to log success and failure for the push notifications with relevant information to allow org developers to troubleshoot push configurations for custom push authenticator. Note that this event is fired whenever a Push is sent. custom-push Since: 2022.05.3 DEVICE.ENROLLMENT.CREATE Enroll new device. This can be used by any admin to monitor when a new device is registered successfully for Okta Verify. The user must have below the max allowed devices and a valid device status (not suspended or deactivated).The targets field contains key details of the enrolled device including name, status, serialNumber, imei, meid, osVersion, osPlatform. which may be useful for identifying the device, tracking which device platforms and OS versions that enrolled in Okta Device Authenticator. device-identityevent-hook-eligibleoie-onlyuser Since: 2020.10.4 DEVICE.LIFECYCLE.ACTIVATE Activate device. You can use the event to audit device status change. When triggered, the device can be suspended or deactivated. Also, a user can access protected resources from an active device if permitted by the App Sign-On policies applied to the resources. device-identityevent-hook-eligibleoie-onlyuser Since: 2021.07.1 DEVICE.LIFECYCLE.DEACTIVATE Deactivate device. You can use the event to audit device status change. When a device is deactivated, it can not be associated with any Okta Verify factor in the future. device-identityevent-hook-eligibleoie-onlyuser Since: 2021.07.1 DEVICE.LIFECYCLE.DELETE Delete device. You can use the event to audit device status change. When triggered, the device no longer appears in the Admin Console. device-identityevent-hook-eligibleoie-onlyuser Since: 2021.07.1 DEVICE.LIFECYCLE.SUSPEND Suspend device. You can use the event to audit device status change. When triggered, access to the device is temporarily paused for users such as contractors or employees who take a leave of absence. Only active devices can be suspended. If a device suspension fails, the cause may be that the device was not active and therefore cannot be suspended. device-identityevent-hook-eligibleoie-onlyuser Since: 2021.07.1 DEVICE.LIFECYCLE.UNSUSPEND Unsuspend device. You can use the event to audit device status change. When triggered, all Okta Verify factors associated with the device are unsuspended, and users can access protected resources from the device. device-identityevent-hook-eligibleoie-onlyuser Since: 2021.07.1 DEVICE.PASSWORD_SYNC.AUTHENTICATION Fired when the OS tries to sync a local account password with an Okta password. Can be used to audit that a credential has been successfully registered, and troubleshoot why a credential registration attempt has failed. Note that the event is fired even when the password sync is unsuccessful. device-accessoie-only Since: 2023.06.1 DEVICE.PASSWORD_SYNC.ENROLLMENT.CREATE This event fires when Desktop Password Sync enrollment is successful or fails. Can be used to audit which users enrolled in Desktop Password Sync or troubleshoot why enrollment failed. Note that the event is fired even when the enrollment is unsuccessful. device-accessoie-only Since: 2023.06.1 DEVICE.PLATFORM.ADD Triggered when an admin adds a device management platform. You can use the event to audit device management platform status change. When triggered, the device management platform will be available to the org. device-identityoie-onlyuser Since: 2021.07.1 DEVICE.PLATFORM.DELETE Triggered when an admin deletes a device management platform. You can use the event to audit device management platform status change. When triggered, the device management platform no longer appears in the Admin Console. device-identityoie-onlyuser Since: 2021.07.1 DEVICE.PLATFORM.UPDATE Triggered when an admin updates a device management platform configuration. You can use the event to audit device management platform configuration change. An admin can only update some fields in the device management platform configuration. device-identityoie-onlyuser Since: 2021.07.1 DEVICE.PUSH.PROVIDER.CREATE Indicates that a new push notification service has been successfully created. The notification service enables push notification as an authentication option through Okta to a push provider such as the Apple Push Notification service or the Google Firebase Cloud Messaging service. You can use this event to verify when a notification service was created for a custom app. When triggered, a new push notification service appears in the Admin Console. oie-onlypush-provider Since: 2022.04.3 DEVICE.PUSH.PROVIDER.DELETE Indicates that a push notification service has been deleted. The notification service enables push notification as an authentication option through Okta to a push provider such as the Apple Push Notification service or the Google Firebase Cloud Messaging service. You can use this event to verify when a notification service was deleted for a custom app. When triggered, a push notification service is removed from the Admin Console. oie-onlypush-provider Since: 2022.04.3 DEVICE.PUSH.PROVIDER.UPDATE Indicates that a push notification service has been updated. The notification service enables push notification as an authentication option through Okta to a push provider such as the Apple Push Notification service or the Google Firebase Cloud Messaging service. You can use this event to verify when a notification service was updated for a custom app. When triggered, a push notification service is updated in the Admin Console. oie-onlypush-provider Since: 2022.04.3 DEVICE.USER.ADD Add device to user. You can use the event to audit device user association activity. The event is triggered when a user adds a new account in Okta Verify. device-identityevent-hook-eligibleoie-onlyuser Since: 2021.07.1 DEVICE.USER.REMOVE Remove device from user. You can use the event to audit device user association activity. The device remains in the Universal Directory after the user is removed. device-identityevent-hook-eligibleoie-onlyuser Since: 2021.07.1 DIRECTORY.APP_USER_PROFILE.BOOTSTRAP Legacy event types: cvd.appuser_profile_bootstrapped Bootstrap application user profile. cvddirectory Since: 2016.12 DIRECTORY.APP_USER_PROFILE.UPDATE Legacy event types: cvd.appuser_profile_updated Update application user profile. cvddirectory Since: 2016.12 DIRECTORY.LINKED_OBJECT.CREATE An admin can create a linked object that is related to user profiles. This event may be used to identify when a linked object is created, and who created the linked object. This may be useful for admins to validate why a change in the user profile has happened. While linked object creation does not trigger or happen as a result of another event, it is overall related to custom property update, creation and deletion. This event only indicates the creation of a linked object. See directory.linked_object.delete for deletion of linked objects. cvddirectory Since: 2022.11.1 DIRECTORY.LINKED_OBJECT.DELETE An admin can delete a linked object that is related to user profiles. This event may be used to identify when a linked object is deleted, and who deleted the linked object. This may be useful for admins to validate why a change in the user profile has happened. While linked object creation does not trigger or happen as a result of another event, it is overall related to custom property update, creation and deletion. This event only indicates the deletion of a linked object. See directory.linked_object.create for creation of linked objects. cvddirectory Since: 2022.11.1 DIRECTORY.MAPPING.UPDATE Legacy event types: cvd.mappings_updated Update universal directory mappings. cvddirectory Since: 2016.12 DIRECTORY.NON_DEFAULT_USER_PROFILE.CREATE Legacy event types: cvd.non_default_user_profile_created Create non-default universal directory user profile. This can be used to audit that a new non-default universal directory user profile has been created. When fired, this event contains the name and id of the newly created user profile. cvddirectory Since: 2019.04.2 DIRECTORY.USER_PROFILE.BOOTSTRAP Legacy event types: cvd.user_profile_bootstrapped Bootstrap universal directory user profile. cvddirectory Since: 2016.12 DIRECTORY.USER_PROFILE.UPDATE Legacy event types: cvd.user_profile_updated Update universal directory user profile directory.user_profile.update. cvddirectory Since: 2016.12 EVENT_HOOK.ACTIVATED Legacy event types: platform.event_hook.activated Triggered when an event hook has been activated. Used to notify admins that an event hook has been activated. When triggered, this events contains information about the activated event hook. event-hook Since: 2019.03.4 EVENT_HOOK.CREATED Legacy event types: platform.event_hook.created Triggered when an event hook has been created. Used to notify admins that an event hook has been created. When triggered, this events contains information about the created event hook. event-hook Since: 2019.03.4 EVENT_HOOK.DEACTIVATED Legacy event types: platform.event_hook.deactivated Triggered when an event hook has been deactivated. Used to notify admins that an event hook has been deactivated. When triggered, this events contains information about the deactivated event hook. event-hook Since: 2019.03.4 EVENT_HOOK.DELETED Legacy event types: platform.event_hook.deleted Triggered when an event hook has been deleted. Used to notify admins that an event hook has been deleted. When triggered, this events contains information about the deleted event hook. event-hook Since: 2019.03.4 EVENT_HOOK.DELIVERY Legacy event types: platform.event_hook.delivered.failure, platform.event_hook.delivered.success Triggered when an event hook delivery fails. Used to identify when an event hook from Okta is not successfully delivered to the configured endpoint. Note that the event is triggered only when the delivery is unsuccessful. event-hook Since: 2019.04.0 EVENT_HOOK.UPDATED Legacy event types: platform.event_hook.updated Triggered when an event hook has been updated. Used to notify admins that an event hook has been updated. When triggered, this events contains information about the updated event hook. event-hook Since: 2019.03.4 EVENT_HOOK.VERIFIED Legacy event types: platform.event_hook.verified.failure, platform.event_hook.verified.success Triggered when attempting to verify an event hook. Used to notify admins about the outcome of event hook endpoint URL verification. Note that the event is fired even when the verification is unsuccessful. event-hook Since: 2019.03.4 GROUP.APPLICATION_ASSIGNMENT.ADD Legacy event types: group.application_assignment.add Add assigned application to group. event-hook-eligiblegroup Since: 2016.06 GROUP.APPLICATION_ASSIGNMENT.REMOVE Legacy event types: group.application_assignment.remove Remove assigned application from group. event-hook-eligiblegroup Since: 2016.05 GROUP.APPLICATION_ASSIGNMENT.SKIP_ASSIGNMENT_RECONCILE Legacy event types: group.application_assignment.skip_assignment_reconcile No Description group Since: 2017.51 GROUP.APPLICATION_ASSIGNMENT.UPDATE Legacy event types: group.application_assignment.update Update assigned application in group. event-hook-eligiblegroup Since: 2016.13 GROUP.LIFECYCLE.CREATE Legacy event types: group.lifecycle.create Create Okta group. This can be used to make sure an Okta group is successfully created. Event fired when an Okta group is successfully created. event-hook-eligiblegroup Since: 2019.11.0 GROUP.LIFECYCLE.DELETE Legacy event types: group.lifecycle.delete Delete Okta group. This can be used to make sure an Okta group is successfully deleted. Event fired when an Okta group is successfully deleted. event-hook-eligiblegroup Since: 2019.11.0 GROUP.PRIVILEGE.GRANT Legacy event types: core.group.admin_privilege.granted Group's admin privilege granted. This can be used to audit the provisioning of admin privileges for groups. When fired, this event contains information about the type of admin privileges the group currently has, and what entity sources the group. The group granted privileges can be an Okta sourced group, and AD-sourced group, or an LDAP-sourced group Related events include: GROUP_PRIVILEGE_REVOKE. event-hook-eligiblegroup Since: 2019.03.0 GROUP.PRIVILEGE.REVOKE Legacy event types: core.group.admin_privilege.revoked Group's admin privilege revoked. This can be used to audit the deprovisioning of admin privileges from groups. When fired, this event indicates the group has no more admin privileges. All of group's privileges were revoked. Related events include: GROUP_PRIVILEGE_GRANT. event-hook-eligiblegroup Since: 2019.03.0 GROUP.PROFILE.UPDATE Okta group profile updated. Events of this type can be used by an IT administrator who wants to trigger an Okta Workflow to provision groups into downstream systems. The utility of the Event type is for Provisioning use cases to downstream systems.A classic example of this is a customer who uses Okta for Office 365 LCM, and wants to push a distribution list from Okta to Office 365. event-hook-eligiblegroup Since: 2021.03.2 GROUP.USER_MEMBERSHIP.ADD Legacy event types: core.user_group_member.user_add Add user to group membership. event-hook-eligiblegroup Since: 2016.02 GROUP.USER_MEMBERSHIP.REMOVE Legacy event types: core.user_group_member.user_remove Remove user from group membership. event-hook-eligiblegroup Since: 2016.02 GROUP.USER_MEMBERSHIP.RULE.ADD_EXCLUSION Legacy event types: core.user.added_to_rule_exclusion Add user to group membership exclusion rule. group Since: 2017.51 GROUP.USER_MEMBERSHIP.RULE.DEACTIVATED Legacy event types: cvd.group_rule_deactivated No Description group Since: 2017.51 GROUP.USER_MEMBERSHIP.RULE.ERROR Legacy event types: cvd.group.user_membership.rule.error group membership rule is in error state. group Since: 2017.51 GROUP.USER_MEMBERSHIP.RULE.EVALUATION Legacy event types: cvd.group.user_membership.rule.evaluation No Description group Since: 2017.51 GROUP.USER_MEMBERSHIP.RULE.INVALIDATE Legacy event types: cvd.group_rule_invalidated Invalidate group membership rule. group Since: 2017.51 GROUP.USER_MEMBERSHIP.RULE.TRIGGER Legacy event types: cvd.group_rule_triggered Trigger group membership rule. group Since: 2017.51 IAM.RESOURCESET.BINDINGS.ADD Admin role assignment is created. This event can be used to track and audit when a new admin role assignment is created. When fired this event contains information about the new user or group admin assignments for roles associated with the resource set. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.RESOURCESET.BINDINGS.DELETE Admin assignment is deleted. This event can be used to track and audit when an admin role assignment is deleted. When fired this event contains information about the deleted user or group admin assignments for roles associated with the resource set. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.RESOURCESET.CREATE Resource set is created. This event can be used to track and audit when a resource set is created. When fired this event contains information about the resources contained in the resource set that is created. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.RESOURCESET.DELETE Resource set is deleted. This event can be used to track and audit when a resource set is deleted. When fired this event contains information about the resources contained in the resource set that is deleted. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.RESOURCESET.RESOURCES.ADD Resources are added to a resource set. This event can be used to audit the resources added to a resource set. When fired this event contains information about the resources added to the resource set. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.RESOURCESET.RESOURCES.DELETE Resources are deleted from a resource set. This event can be used to audit the resources deleted from a resource set. When fired this event contains information about the resources deleted from the resource set. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.ROLE.CREATE Custom admin role is created. This event can be used to track and audit when a custom admin role is created. When fired this event contains information about the permissions contained in the role that is created. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.ROLE.DELETE Custom admin role is deleted. This event can be used to track and audit when a custom admin role is deleted. When fired this event contains information about the permissions contained in the role that is deleted. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.ROLE.PERMISSION.CONDITIONS.ADD Conditions added to a permission in Okta. Use this event to evaluate impact on admin privileges as their scope might be impacted. This event is triggered when a condition is added to a role-based permission in Okta. A condition on a permission allows super admins to implement finer grained authorizations for stricter security postures. The event can be accompanied with other events for permissions such as iam.role.permissions.add. admin-roleevent-hook-eligible Since: 2022.12.0 IAM.ROLE.PERMISSION.CONDITIONS.DELETE Conditions deleted from a permission in Okta. Use this event to evaluate impact on admin privileges as their scope might be impacted. This event is triggered when a condition is deleted from a role-based permission in Okta. A condition on a permission allows super admins to implement finer grained authorizations for stricter security postures. The event can be accompanied with other events for permissions such as iam.role.permissions.delete. admin-roleevent-hook-eligible Since: 2022.12.0 IAM.ROLE.PERMISSIONS.ADD Permissions are added to a custom admin role. This event can be used to audit the permissions added to a custom admin role. When fired this event contains information about the permissions added to the role. admin-roleevent-hook-eligible Since: 2021.02.2 IAM.ROLE.PERMISSIONS.DELETE Permissions are deleted from a custom admin role. This event can be used to audit the permissions deleted from a custom admin role. When fired this event contains information about the permissions deleted from the role. admin-roleevent-hook-eligible Since: 2021.02.2 INLINE_HOOK.ACTIVATED Legacy event types: platform.inline_hook.activated Triggered when an inline hook in activated. Used to identify when an inline hook lifecycle status was changed to activated. When triggered, this events contains information about the activated inline hook. inline-hook Since: 2019.01.2 INLINE_HOOK.CREATED Legacy event types: platform.inline_hook.created Triggered when an inline hook has been created. Used to notify admins that an inline hook has been created. When triggered, this events contains information about the created inline hook. inline-hook Since: 2019.01.2 INLINE_HOOK.DEACTIVATED Legacy event types: platform.inline_hook.deactivated Triggered when an inline hook is deactivated. Used to identify when an inline hook lifecycle status was changed to deactivated. When triggered, this events contains information about the deactivated inline hook. inline-hook Since: 2019.01.2 INLINE_HOOK.DELETED Legacy event types: platform.inline_hook.deleted Triggered when an inline hook has been deleted. Used to notify admins that an inline hook has been deleted. When triggered, this events contains information about the deleted inline hook. inline-hook Since: 2019.01.2 INLINE_HOOK.EXECUTED Legacy event types: platform.inline_hook.executed.failure, platform.inline_hook.executed.success Triggered when an inline hook has been executed. Used to notify admins about the outcome of execution of an inline hook. Note that the event is fired when the execution is unsuccessful. event-hook-eligibleinline-hook Since: 2019.01.2 INLINE_HOOK.RESPONSE.PROCESSED Legacy event types: platform.inline_hook.response.processed.failure, platform.inline_hook.response.processed.success Triggered after Okta has finished processing response from an inline hook. Used to notify admins about the outcome of processing response from an inline hook. Note that the event is fired even when the processing is unsuccessful. inline-hook Since: 2019.01.2 INLINE_HOOK.UPDATED Legacy event types: platform.inline_hook.updated Triggered when an inline hook has been modified. Used to notify admins that an inline hook has been updated. When triggered, this events contains information about the updated inline hook. inline-hook Since: 2019.01.2 INTEGRATION.API_SERVICE.LIFECYCLE.AUTHORIZE Authorize API service integration. This event is triggered when an admin authorized an OAuth 2.0 service app from the Okta Integration Network (OIN) to access the Okta org (tenant) using Okta management APIs. An API service integration is an integration to an OAuth 2.0 service app available from the Okta Integration Network (OIN). appintegration Since: 2023.02.2 INTEGRATION.API_SERVICE.LIFECYCLE.REVOKE Revoke API service integration. This event is triggered when an admin revoked API access from an OAuth 2.0 service app to the Okta org. An API service integration is an integration to an OAuth 2.0 service app available from the Okta Integration Network (OIN). appintegration Since: 2023.02.2 MASTER_APPLICATION.USER_MEMBERSHIP.ADD Legacy event types: app.generic.provision.assign_user_to_app User provisioned to app. uncategorized Since: 2018.06 MIM.COMMAND.GENERIC.ACKNOWLEDGED Legacy event types: mim.command.generic.acknowledged No Description mim Since: 2016.13 MIM.COMMAND.GENERIC.CANCELLED Legacy event types: mim.command.generic.cancelled No Description mim Since: 2016.13 MIM.COMMAND.GENERIC.DELEGATED Legacy event types: mim.command.generic.delegated No Description mim Since: 2016.13 MIM.COMMAND.GENERIC.ERROR Legacy event types: mim.command.generic.error No Description mim Since: 2016.13 MIM.COMMAND.GENERIC.NEW Legacy event types: mim.command.generic.new No Description mim Since: 2016.13 MIM.COMMAND.GENERIC.NOTNOW Legacy event types: mim.command.generic.notnow No Description mim Since: 2016.13 MIM.COMMAND.IOS.ACKNOWLEDGED Legacy event types: mim.command.ios.acknowledged No Description mim Since: 2016.13 MIM.COMMAND.IOS.CANCELLED Legacy event types: mim.command.ios.cancelled No Description mim Since: 2016.13 MIM.COMMAND.IOS.ERROR Legacy event types: mim.command.ios.error No Description mim Since: 2016.13 MIM.COMMAND.IOS.FORMATERROR Legacy event types: mim.command.ios.formaterror No Description mim Since: 2016.13 MIM.COMMAND.IOS.NEW Legacy event types: mim.command.ios.new No Description mim Since: 2016.13 MIM.CREATEENROLLMENT.ANDROID Legacy event types: mim.createEnrollment.ANDROID No Description mim Since: 2016.39 MIM.CREATEENROLLMENT.IOS Legacy event types: mim.createEnrollment.IOS No Description mim Since: 2016.39 MIM.CREATEENROLLMENT.OSX Legacy event types: mim.createEnrollment.OSX No Description mim Since: 2016.39 MIM.CREATEENROLLMENT.UNKNOWN Legacy event types: mim.createEnrollment.UNKNOWN No Description mim Since: 2016.39 MIM.CREATEENROLLMENT.WINDOWS Legacy event types: mim.createEnrollment.WINDOWS No Description mim Since: 2016.39 MIM.STREAMDEVICESAPPLISTCSVDOWNLOAD Legacy event types: mim.streamDevicesAppListCSVDownload No Description mim Since: 2016.39 MIM.STREAMDEVICESCSVDOWNLOAD Legacy event types: mim.streamDevicesCSVDownload No Description mim Since: 2016.39 NETWORK_ZONE.RULE.DISABLED Legacy event types: network_zone.rule.disabled No Description network-zone Since: 2016.12 OAUTH2.AS.ACTIVATED Legacy event types: api.oauth2.as.activated Authorization server is activated. oauth2oauth2-as-lifecycle Since: 2017.22 OAUTH2.AS.CREATED Legacy event types: api.oauth2.as.created Authorization server is created. oauth2oauth2-as-lifecycle Since: 2016.50 OAUTH2.AS.DEACTIVATED Legacy event types: api.oauth2.as.deactivated Authorization server is deactivated. oauth2oauth2-as-lifecycle Since: 2017.22 OAUTH2.AS.DELETED Legacy event types: api.oauth2.as.deleted Authorization server is deleted. oauth2oauth2-as-lifecycle Since: 2016.50 OAUTH2.AS.UPDATED Legacy event types: api.oauth2.as.updated Authorization server is updated. oauth2oauth2-as-lifecycle Since: 2016.50 OAUTH2.CLAIM.CREATED Legacy event types: api.oauth2.claim.created OAuth2 claim is created. oauth2oauth2-claim Since: 2016.50 OAUTH2.CLAIM.DELETED Legacy event types: api.oauth2.claim.deleted OAuth2 claim is deleted. oauth2oauth2-claim Since: 2016.50 OAUTH2.CLAIM.UPDATED Legacy event types: api.oauth2.claim.updated OAuth2 claim is updated. oauth2oauth2-claim Since: 2016.50 OAUTH2.SCOPE.CREATED Legacy event types: api.oauth2.scope.created OAuth2 scope is created. oauth2oauth2-scope Since: 2016.50 OAUTH2.SCOPE.DELETED Legacy event types: api.oauth2.scope.deleted OAuth2 scope is deleted. oauth2oauth2-scope Since: 2016.50 OAUTH2.SCOPE.UPDATED Legacy event types: api.oauth2.scope.updated OAuth2 scope is updated. oauth2oauth2-scope Since: 2016.50 OMM.APP.VPN.SETTINGS.CHANGED Legacy event types: omm.app.VPN.settings.changed No Description omm Since: 2018.01 OMM.APP.WIFI.SETTINGS.CHANGED Legacy event types: omm.app.WIFI.settings.changed No Description omm Since: 2018.01 OMM.APP.EAS.CERT_BASED.SETTINGS.CHANGED Legacy event types: omm.app.eas.cert_based.settings.changed No Description omm Since: 2018.01 OMM.APP.EAS.DISABLED Legacy event types: omm.app.eas.disabled No Description omm Since: 2018.01 OMM.APP.EAS.SETTINGS.CHANGED Legacy event types: omm.app.eas.settings.changed No Description omm Since: 2018.01 OMM.CMA.CREATED Legacy event types: omm.cma.created No Description omm Since: 2018.01 OMM.CMA.DELETED Legacy event types: omm.cma.deleted No Description omm Since: 2018.01 OMM.CMA.UPDATED Legacy event types: omm.cma.updated No Description omm Since: 2018.01 OMM.ENROLLMENT.CHANGED Legacy event types: omm.enrollment.changed No Description omm Since: 2018.01 ORG.NOT_CONFIGURED_ORIGIN.REDIRECTION.USAGE Legacy event types: org.not_configured_origin.redirection.usage Using untrusted origin for redirection. adminorg Since: 2017.44 PAM.AD_CONNECTION.CREATE This event is triggered after an Active Directory Connection is created for discovering servers. pam Since: 2022.02.0 PAM.AD_CONNECTION.DELETE This event is triggered after an Active Directory Connection is deleted. pam Since: 2022.02.0 PAM.AD_CONNECTION.UPDATE his event is triggered after an Active Directory Connection is updated. pam Since: 2022.02.0 PAM.AD_TASK_SETTINGS.CREATE This event is triggered after settings that are related to discovering servers in an Active Directory connection are created. pam Since: 2022.02.0 PAM.AD_TASK_SETTINGS.DELETE This event is triggered after settings that are related to discovering servers in an Active Directory connection are deleted. pam Since: 2022.02.0 PAM.AD_TASK_SETTINGS.UPDATE This event is triggered after settings that are related to discovering servers in an Active Directory connection are updated. pam Since: 2022.02.0 PAM.AD_TASK_SETTINGS.UPDATE_SCHEDULE This event is triggered after the schedule for discovering Active Directory servers is updated. pam Since: 2022.02.0 PAM.AD_USER_SYNC_TASK_SETTINGS.ACTIVATE This event is triggered after the settings for discovering Active Directory users in an Active Directory connection is activated. Use this event to monitor activation of AD User Sync Task Settings objects. This event contains reference to an AD User Sync Task Settings object. pam Since: 2023.06.1 PAM.AD_USER_SYNC_TASK_SETTINGS.CREATE This event is triggered after settings that are related to discovering users in an Active Directory connection are created. Use this event to monitor creation of AD User Sync Task Settings objects. This event contains reference to an AD User Sync Task Settings object. pam Since: 2023.06.1 PAM.AD_USER_SYNC_TASK_SETTINGS.DEACTIVATE This event is triggered after the settings for discovering Active Directory users in an Active Directory connection is deactivated. Use this event to monitor deactivation of AD User Sync Task Settings objects. This event contains reference to an AD User Sync Task Settings object. pam Since: 2023.06.1 PAM.AD_USER_SYNC_TASK_SETTINGS.DELETE This event is triggered after the settings for discovering Active Directory users in an Active Directory connection is deleted. Use this event to monitor deletion of AD User Sync Task Settings objects. This event contains reference to an AD User Sync Task Settings object. pam Since: 2023.06.1 PAM.AD_USER_SYNC_TASK_SETTINGS.UPDATE This event is triggered after settings that are related to discovering users in an Active Directory connection are updated. Use this event to monitor update of AD User Sync Task Settings objects. This event contains reference to an AD User Sync Task Settings object. pam Since: 2023.06.1 PAM.AD_USER_SYNC_TASK_SETTINGS.UPDATE_SCHEDULE This event is triggered after the schedule for discovering Active Directory users in an Active Directory connection is updated. Use this event to monitor schedule update of AD User Sync Task Settings objects. This event contains reference to an AD User Sync Task Settings object. pam Since: 2023.06.1 PAM.APIKEY.DELETE This event is triggered after a service user's API key is deleted. pam Since: 2022.02.0 PAM.APIKEY.ROTATE This event is triggered after a service user's API key is rotated. pam Since: 2022.02.0 PAM.AUTH_TOKEN.ISSUE This event is triggered when an ASA client has been authenticated and is issued an authentication token with elevated capabilities. pam Since: 2022.02.0 PAM.BILLING_CONTACT.CREATE This event is triggered after a billing contact is created for an ASA team. This event is only applicable to legacy ASA customers. pam Since: 2022.02.0 PAM.CLIENT.ASSIGN This event is triggered after an ASA client is assigned to an ASA user. pam Since: 2022.02.0 PAM.CLIENT.ENROLL This event is triggered after an ASA client is enrolled with ASA. pam Since: 2022.02.0 PAM.CLIENT.REMOVE This event is triggered after an ASA client is removed from a team. pam Since: 2022.02.0 PAM.CLIENT.STATE.UPDATE This event is triggered after the state of an ASA client is updated. pam Since: 2022.02.0 PAM.CLIENT_ENROLLMENT_POLICIES.CREATE This event is triggered after an ASA client enrollment policy is created. pam Since: 2022.02.0 PAM.CLIENT_ENROLLMENT_POLICIES.DELETE This event is triggered after an ASA client enrollment policy is deleted. pam Since: 2022.02.0 PAM.CLIENT_ENROLLMENT_POLICIES.UPDATE This event is triggered after an ASA client enrollment policy is updated. pam Since: 2022.02.0 PAM.CLIENT_ENROLLMENT_POLICY_TOKEN.DELETE This event is triggered after an ASA client enrollment token is deleted. pam Since: 2022.02.0 PAM.CLIENT_ENROLLMENT_POLICY_TOKEN.ROTATE This event is triggered after an ASA client enrollment token is rotated. pam Since: 2022.02.0 PAM.CLOUD_ACCOUNT.CREATE This event is triggered after a project cloud account is created for importing servers into ASA. pam Since: 2022.02.0 PAM.CLOUD_ACCOUNT.DELETE This event is triggered after a cloud account has been removed from a project. pam Since: 2022.02.0 PAM.CLOUD_ACCOUNT.UPDATE This event is triggered after a cloud account, which is used for importing servers into ASA, is updated. pam Since: 2022.02.0 PAM.ENTITLEMENT_SUDO.ADD_TO_PROJECT This event is triggered after a sudo entitlement object is added to a project. pam Since: 2022.02.0 PAM.ENTITLEMENT_SUDO.CREATE This event is triggered after a sudo entitlement object is created. pam Since: 2022.02.0 PAM.ENTITLEMENT_SUDO.REMOVE This event is triggered after a sudo entitlement object is removed. pam Since: 2022.02.0 PAM.ENTITLEMENT_SUDO.REMOVE_FROM_PROJECT This event is triggered after a sudo entitlement object is removed from a project. pam Since: 2022.02.0 PAM.ENTITLEMENT_SUDO.UPDATE This event is triggered after a sudo entitlement object is updated. pam Since: 2022.02.0 PAM.GATEWAY.CREATE This event is triggered after an ASA gateway is created. pam Since: 2022.02.0 PAM.GATEWAY.DELETE This event is triggered after an ASA gateway is deleted. pam Since: 2022.02.0 PAM.GATEWAY.SETUP_TOKEN.CREATE This event is triggered after a gateway setup token is created. pam Since: 2022.02.0 PAM.GATEWAY.SETUP_TOKEN.DELETE This event is triggered after a gateway setup token is deleted. pam Since: 2022.02.0 PAM.GATEWAY.SETUP_TOKEN.UPDATE This event is triggered after a gateway setup token is updated. pam Since: 2022.02.0 PAM.GATEWAY.UPDATE This event is triggered after settings are updated on an ASA gateway. pam Since: 2022.02.0 PAM.GATEWAY_CREDS.ISSUE This event is triggered after the gateway issues credentials for a server. pam Since: 2022.02.0 PAM.GROUP.BULK_MEMBERSHIP_CHANGE This event is triggered after the members belonging to an ASA group were updated in bulk by a SCIM driver. pam Since: 2022.02.0 PAM.GROUP.CREATE This event is triggered after an ASA group is created. pam Since: 2022.02.0 PAM.GROUP.DELETE This event is triggered after an ASA group is deleted. pam Since: 2022.02.0 PAM.INCOMING_FEDERATION.APPROVE This event is triggered when an ASA team admin from another team has approved a request to federate identities identities from their team to this team. Only applicable to legacy ASA customers. pam Since: 2022.02.0 PAM.INCOMING_FEDERATION.REQUEST This event is triggered after an ASA team admin submits a request to federate identities from a different team to their team. This event is only applicable to legacy ASA customers. pam Since: 2022.02.0 PAM.MEMBER.ADD This event is triggered after a user is added to an ASA group. pam Since: 2022.02.0 PAM.MEMBER.REMOVE This event is triggered after a user is removed from an ASA group. pam Since: 2022.02.0 PAM.OFFLINE_DISABLED_EVENT This event is triggered after disconnected mode is disabled for a group. pam Since: 2022.02.0 PAM.OFFLINE_ENABLED_EVENT This event is triggered after disconnected mode is enabled for a group. pam Since: 2022.02.0 PAM.OFFLINE_GROUP.SECRETS.ROTATE This event is triggered after disconnected mode credentials are rotated for a group. pam Since: 2022.02.0 PAM.OUTGOING_FEDERATION.APPROVE This event is triggered when an ASA team admin from this team has approved a request to federate identities from this team to another team. Only applicable to legacy ASA customers. pam Since: 2022.02.0 PAM.PASSWORD.CHANGE This event is triggered after a user password changed. This event is only applicable to legacy ASA customers. pam Since: 2022.02.0 PAM.PASSWORD.RESET This event is triggered after a user password reset request is submitted. This event is only applicable to legacy ASA customers. pam Since: 2022.02.0 PAM.PERMISSION.CHANGE This event is triggered after group permissions are updated. pam Since: 2022.02.0 PAM.PREAUTHORIZATION.CREATE This event is triggered after a preauthorization is created. pam Since: 2022.02.0 PAM.PREAUTHORIZATION.UPDATE This event is triggered after a preauthorization is updated. pam Since: 2022.02.0 PAM.PROJECT.ADD_GROUP This event is triggered after a group is added to a project. pam Since: 2022.02.0 PAM.PROJECT.CREATE This event is triggered after a Project is created. For ASA, this event only contains the Project name. For Okta Privileged Access, this event contains the Project name and the associated Resource Group. pam Since: 2022.02.0 PAM.PROJECT.DELETE This event is triggered after a Project is deleted. For ASA, this event only contains the Project name. For Okta Privileged Access, this event contains the Project name and the associated Resource Group. pam Since: 2022.02.0 PAM.PROJECT.REMOVE_GROUP This event is triggered after a group is removed from a project. pam Since: 2022.02.0 PAM.PROJECT.UPDATE This event is triggered after a Project is updated. Only applicable for Okta Privileged Access. This event contains the Project name and the associated Resource Group. pam Since: 2023.04.0 PAM.PROJECT_GROUP_SELECTOR.UPDATE This event is triggered after server selectors for a group assigned to a project are updated. pam Since: 2022.02.0 PAM.RESOURCE_GROUP.CREATE This event is triggered after a Resource Group is created. Monitor this event to be notified when new teams in your Okta org begin using Okta Privileged Access. Only applicable for Okta Privileged Access. This event defines when a Resource Administrator has created a new Resource Group to manage resources. pam Since: 2023.04.0 PAM.RESOURCE_GROUP.DELETE This event is triggered after a Resource Group is deleted. Monitor this event to be notified when a team in your Okta org stops managing access to a resource. Only applicable for Okta Privileged Access. This event defines when a Resource Administrator deleted a Resource Group. pam Since: 2023.04.0 PAM.RESOURCE_GROUP.UPDATE This event is triggered after a Resource Group is updated. Monitor this event to be notified when Resource Group settings change. Only applicable for Okta Privileged Access. This event defines when a Resource Administrator has modified the settings for a Resource Group. pam Since: 2023.04.0 PAM.SECURITY_POLICY.CREATE This event is triggered after a Security Policy is created. Use this event to determine when Security Administrators create new Security Policies. Only applicable for Okta Privileged Access. This event contains the Principals associated with the Security Policy and the number of rules in the policy. pam Since: 2023.04.0 PAM.SECURITY_POLICY.DELETE This event is triggered after a Security Policy is deleted. Use this event to indicate that a policy that was previously in place is no longer active and end user access to resources may be changed. Only applicable for Okta Privileged Access. This event contains the Principals associated with the Security Policy and the number of rules in the policy. pam Since: 2023.04.0 PAM.SECURITY_POLICY.UPDATE This event is triggered after a Security Policy is updated. Use this event to determine when Security Administrators update Security Policies and to identify important changes made to policies. Only applicable for Okta Privileged Access. This event contains the Principals associated with the Security Policy and the number of rules in the policy. pam Since: 2023.04.0 PAM.SERVER.ENROLL This event is triggered after a server running the Okta ASA agent has enrolled with ASA. pam Since: 2022.02.0 PAM.SERVER.REASSIGN This event is triggered after a server is reassigned from one project to another. pam Since: 2022.02.0 PAM.SERVER.REMOVE This event is triggered after a server is removed from the ASA inventory. pam Since: 2022.02.0 PAM.SERVER.SSH_LOGIN This event is triggered after a user performs an SSH login to a server. pam Since: 2022.02.0 PAM.SERVER_ACCOUNT.DISCOVERED This event is triggered after a server account is first discovered by the Server Agent. Only applicable for Okta Privileged Access. This event contains the name of the discovered account and the associated server. pam Since: 2023.04.0 PAM.SERVER_ACCOUNT.PASSWORD_CHANGE.INITIATED This event is triggered after a password rotation is requested for a local server account. Use this event to verify that the password settings are being correctly applied to your servers. This event contains the name of the local server account being modified and the associated server. pam Since: 2023.04.0 PAM.SERVER_ACCOUNT.PASSWORD_CHANGE.OUT_OF_BAND This event is triggered after a server account password is altered via a method other than scheduled rotation. You MUST monitor this event to ensure that unauthorized users are not attempting to reset local server account passwords in an attempt to gain access to servers. Only applicable for Okta Privileged Access. This event contains the modified server account and the associated server. pam Since: 2023.04.0 PAM.SERVER_ACCOUNT.PASSWORD_CHANGE.UPDATE This event is triggered after a server reports an attempt to perform a password rotation. The outcome.result field contains either 'SUCCESS' or 'FAILURE' and should be monitored to detect any password rotation errors. Only applicable for Okta Privileged Access. This event contains the name of the local server account, the associated server, and indicates if the rotation was successful. pam Since: 2023.04.0 PAM.SERVER_ACCOUNT.UPDATE This event is triggered after a discovered server account is updated. Use this event to observe how often the system updates server accounts. Only applicable for Okta Privileged Access. This event contains the name of the updated account and the associated server. pam Since: 2023.04.0 PAM.SERVER_LABELS.UPDATE This event is triggered after server labels are updated. pam Since: 2022.02.0 PAM.SERVICE.CREATE This event is triggered after a service bound to a service user is created on a server. pam Since: 2022.02.0 PAM.SERVICE.REMOVE This event is triggered after a service is removed from a server. pam Since: 2022.02.0 PAM.TEAM.CREATE This event is triggered after a team is created in ASA. pam Since: 2022.02.0 PAM.TEAM_GROUP_ATTRIBUTE.CREATE This event is triggered after team-level group attributes are created. pam Since: 2022.02.0 PAM.TEAM_GROUP_ATTRIBUTE.DELETE This event is triggered after team-level group attributes are deleted. pam Since: 2022.02.0 PAM.TEAM_GROUP_ATTRIBUTE.UPDATE This event is triggered after team-level group attributes are updated. pam Since: 2022.02.0 PAM.TEAM_INVITATION.CREATE This event is triggered after an invitation to join a team is sent. This event is only applicable to legacy ASA customers. pam Since: 2022.02.0 PAM.TEAM_PROJECT_GROUP_ATTRIBUTE.CREATE This event is triggered after project-level group attribute overrides are created. pam Since: 2022.02.0 PAM.TEAM_PROJECT_GROUP_ATTRIBUTE.DELETE This event is triggered after project-level group attribute overrides are deleted. pam Since: 2022.02.0 PAM.TEAM_PROJECT_GROUP_ATTRIBUTE.UPDATE This event is triggered after project-level group attribute overrides are updated. pam Since: 2022.02.0 PAM.TEAM_PROJECT_USER_ATTRIBUTE.CREATE This event is triggered after project-level user attribute overrides are created. pam Since: 2022.02.0 PAM.TEAM_PROJECT_USER_ATTRIBUTE.DELETE This event is triggered after project-level user attribute overrides are deleted. pam Since: 2022.02.0 PAM.TEAM_PROJECT_USER_ATTRIBUTE.UPDATE This event is triggered after project-level user attribute overrides are updated. pam Since: 2022.02.0 PAM.TEAM_SETTINGS.UPDATE This event is triggered after team settings are updated. pam Since: 2022.02.0 PAM.TEAM_USER_ATTRIBUTE.CREATE This event is triggered after team-level user attributes are created. pam Since: 2022.02.0 PAM.TEAM_USER_ATTRIBUTE.DELETE This event is triggered after team-level user attributes are deleted. pam Since: 2022.02.0 PAM.TEAM_USER_ATTRIBUTE.UPDATE This event is triggered after team-level user attributes are updated. pam Since: 2022.02.0 PAM.UNBOUND_CLIENT.ENROLL This event is triggered after an ASA client is enrolled by using the 'sft fleet enroll' command. pam Since: 2022.02.0 PAM.UNMANAGED_SERVER.CREATE This event is triggered after a server is created in ASA directly through the API and not by an ASA agent installation. pam Since: 2022.02.0 PAM.USER.CREATE This event is triggered after a user is created in ASA. pam Since: 2022.02.0 PAM.USER.REMOVE This event is triggered after a user is removed from ASA. pam Since: 2022.02.0 PAM.USER.UPDATE This event is triggered after a user is updated in ASA. pam Since: 2022.02.0 PAM.USER_CREDS.ISSUE This event is triggered after ASA credentials are issued to access servers. pam Since: 2022.02.0 PKI.CA.ADD Triggered when an admin uploads a 3rd party certificate chain. You can use the event to audit the 3rd party certificate authority status change. When triggered, the 3rd party certificate authority will appear in the Admin Console. device-identityoie-onlyuser Since: 2021.07.1 PKI.CA.DELETE Triggered when an admin deletes a 3rd party certificate chain. You can use the event to audit the 3rd party certificate authority status change. When triggered, the 3rd party certificate authority is no longer available to the org. device-identityoie-onlyuser Since: 2021.07.1 PKI.CERT.BIND Triggered when a certificate is bound to a device. You can use the event to audit certificate device binding relationship. When triggered, the device appears in the Admin Console as managed device. device-identityoie-onlyuser Since: 2021.09.1 PKI.CERT.CRL_DOWNLOAD_FAILURE A failure outcome indicates that there was an issue downloading the Certificate Revocation List (CRL) from the URL specified in the certificate and may require action to address it. When an administrator observes a pki.cert.lifecycle.crl_download_failure event with a failure outcome they should ensure that the CRL endpoint is up and running properly and has not been changed by the issuing Certificate Authority (CA). When fired, this event will include the URL of the CRL that is having an issue along with a corresponding HTTP error code. device-identityoie-only Since: 2023.07.2 PKI.CERT.ISSUE Legacy event types: core.user_auth.pki.cert.issue Device Trust certificate issuance. device-trust-cert-distribution-and-binding Since: 2017.45 PKI.CERT.LIFECYCLE.ACTIVATE Triggered when a certificate marked as hold is removed from the CRL. You can use the event to audit certificate lifecycle change. When an admin activates/unsuspends a device, the certificate associated with the device is activated when used in Okta Verify flow next time. device-identityoie-onlyuser Since: 2021.09.1 PKI.CERT.LIFECYCLE.DELETE Triggered when a certificate is deleted as a result of an admin deleting the binding device. You can use the event to audit certificate lifecycle change. When triggered, the certificate no longer appears in the Admin Console. device-identityoie-onlyuser Since: 2021.09.1 PKI.CERT.LIFECYCLE.HOLD Triggered when a certificate is temporarily on hold and appears on CRL. You can use the event to audit certificate lifecycle change. A certificate on hold can be activated after it is removed from CRL. device-identityoie-onlyuser Since: 2021.09.1 PKI.CERT.LIFECYCLE.REVOKE Triggered when a certificate is revoked and appears on CRL. You can use the event to audit certificate lifecycle change. Once revoked, a certificates can not be activated. device-identityoie-onlyuser Since: 2021.09.1 PKI.CERT.LIFECYCLE.SUSPEND Triggered when a certificate is suspended as a result of an admin deactivating the binding device. You can use the event to audit certificate lifecycle change. When triggered, the certificate can not be used to send the management hint. device-identityoie-onlyuser Since: 2021.09.1 PKI.CERT.RENEW Legacy event types: core.user_auth.pki.cert.renew Device Trust certificate renewal. device-trust-cert-distribution-and-binding Since: 2017.45 PKI.CERT.REVOKE Legacy event types: core.user_auth.pki.cert.revoke Device Trust certificate revocation. device-trust-cert-distribution-and-binding Since: 2017.45 PLUGIN.DOWNLOADED Legacy event types: plugin.downloaded Plugin downloaded. plugin Since: 2016.48 PLUGIN.SCRIPT_STATUS Legacy event types: plugin.script_status Status information from script execution. plugin Since: 2016.48 POLICY.CONTINUOUS_ACCESS_EVALUATE.FAIL Continuous Access Evaluation has occurred and has resulted in a FAIL action. Can be used to identify which user, apps, and session were involved in a CAE failure event. Event fired when CAE evaluation results in failure. event-hook-eligiblepolicysecuritysession Since: 2023.03.0 POLICY.EVALUATE_SIGN_ON No Description policy Since: 2017.11 POLICY.EXECUTE.USER.START Legacy event types: policy.execute.user.start Start execution of policy for user. policy Since: 2018.15 POLICY.LIFECYCLE.ACTIVATE Legacy event types: policy.activated Activate policy. event-hook-eligiblepolicy Since: 2016.14 POLICY.LIFECYCLE.CREATE Legacy event types: policy.created Create policy. policy Since: 2016.14 POLICY.LIFECYCLE.DEACTIVATE Legacy event types: policy.deactivated Deactivate policy. event-hook-eligiblepolicy Since: 2016.14 POLICY.LIFECYCLE.DELETE Legacy event types: policy.deleted Delete policy. policy Since: 2016.14 POLICY.LIFECYCLE.OVERWRITE Legacy event types: policy.overwritten Overwrite policy. policy Since: 2017.45 POLICY.LIFECYCLE.UPDATE Legacy event types: policy.updated Update policy. event-hook-eligiblepolicy Since: 2016.14 POLICY.MAPPING.CREATE Create policy mapping. This event is used to audit when a policy is mapped to a resource. This event is fired when a policy is mapped to a resource. The isPreviousPolicy attribute within the Policy Targets' Details denotes whether or not it was the previous or new policy being mapped. policy Since: 2021.12.0 POLICY.RULE.ACTION.EXECUTE Legacy event types: policy.rule.action.execute Scheduled execution of policy rule action. policy Since: 2018.15 POLICY.RULE.ACTIVATE Legacy event types: policy.rule.activated Activate policy rule. event-hook-eligiblepolicy Since: 2016.14 POLICY.RULE.ADD Legacy event types: policy.rule.added Add policy rule. event-hook-eligiblepolicy Since: 2016.14 POLICY.RULE.DEACTIVATE Legacy event types: policy.rule.deactivated Deactivate policy rule. event-hook-eligiblepolicy Since: 2016.14 POLICY.RULE.DELETE Legacy event types: policy.rule.deleted Delete policy rule. event-hook-eligiblepolicy Since: 2016.14 POLICY.RULE.INVALIDATE Legacy event types: policy.rule.invalidated Invalidate policy rule. policy Since: 2016.14 POLICY.RULE.UPDATE Legacy event types: policy.rule.updated Update policy rule. event-hook-eligiblepolicy Since: 2016.14 POLICY.SCHEDULED.EXECUTE Legacy event types: policy.scheduled.execute Scheduled execution of policy. policy Since: 2018.15 SCHEDULED_ACTION.USER_SUSPENSION.CANCELED Legacy event types: cvd.scheduled_action.user_suspension.canceled Canceled scheduled user suspension. uncategorized Since: 2017.32 SCHEDULED_ACTION.USER_SUSPENSION.COMPLETED Legacy event types: cvd.scheduled_action.user_suspension.completed Completed scheduled user suspension. uncategorized Since: 2017.32 SCHEDULED_ACTION.USER_SUSPENSION.SCHEDULED Legacy event types: cvd.scheduled_action.user_suspension.scheduled Scheduled user suspension. uncategorized Since: 2017.32 SCHEDULED_ACTION.USER_SUSPENSION.UPDATED Legacy event types: cvd.scheduled_action.user_suspension.updated Updated scheduled user suspension. uncategorized Since: 2017.32 SECURITY.AUTHENTICATOR.LIFECYCLE.ACTIVATE Fired when an admin activates an authenticator for the org. This event can be used to identify who activated an authenticator and which authenticator was activated. When fired, this event contains information about the authenticator type that was activated and the actor who activated the authenticator. Authenticator activation occurs when an authenticator is added. Related events include security.authenticator.lifecycle.deactivate. authenticatorevent-hook-eligibleoie-only Since: 2020.06.3 SECURITY.AUTHENTICATOR.LIFECYCLE.CREATE Fired when an admin creates an authenticator for the org. This event can be used to identify who created an authenticator and which authenticator was created. The actor specifies the user that created the authenticator and the target specifies the authenticator name and the id. This event could also contain some authenticator specific information. Authenticator creation occurs when an authenticator is added. Related events include security.authenticator.lifecycle.update. authenticatorevent-hook-eligibleoie-only Since: 2022.06.0 SECURITY.AUTHENTICATOR.LIFECYCLE.DEACTIVATE Fired when an admin deactivates an authenticator for the org. This event can be used to identify who deactivated an authenticator and which authenticator was deactivated. When fired, this event contains information about the authenticator type that was deactivated and the actor who deactivated the authenticator. Authenticator deactivation occurs when an authenticator is removed. Related events include security.authenticator.lifecycle.activate. authenticatorevent-hook-eligibleoie-only Since: 2020.06.3 SECURITY.AUTHENTICATOR.LIFECYCLE.UPDATE Fired when an admin updates an authenticator in the org. This event can be used to identify who updated an authenticator and which authenticator was updated. The actor specifies the user that updated the authenticator and the target specifies the authenticator name and the id. This event could also contain some authenticator specific information. Authenticator update occurs when an authenticator is edited. Related events include security.authenticator.lifecycle.create. authenticatorevent-hook-eligibleoie-only Since: 2022.06.0 SECURITY.DEVICE.ADD_REQUEST_BLACKLIST_POLICY Legacy event types: security.device.add_request_blacklist_policy Added request blacklist to request blacklist policies. devicesecurity Since: 2018.08 SECURITY.DEVICE.REMOVE_REQUEST_BLACKLIST_POLICY Legacy event types: security.device.remove_request_blacklist_policy Removed request blacklist from request blacklist policies. devicesecurity Since: 2018.08 SECURITY.DEVICE.TEMPORARILY_DISABLE_BLACKLISTING Legacy event types: security.device.temporarily_disable_blacklisting Temporarily disabling blacklisting. devicesecurity Since: 2018.05 SECURITY.REQUEST.BLOCKED Legacy event types: security.zone.request.blocked Security request blocked. security Since: 2018.32 SECURITY.SESSION.DETECT_CLIENT_ROAMING Legacy event types: security.session.detect_client_roaming Roaming session detected for user. securitysession Since: 2017.28 SECURITY.THREAT.CONFIGURATION.UPDATE Legacy event types: security.threat.configuration.update Fired when a ThreatInsight configuration has been updated. This can be used to identify when an existing ThreatInsight configuration has been updated. An update can be updating the action or the excluded zones. When fired, this event contains information about who made the update to the configuration. threat-insight-configuration Since: 2019.07.0 SECURITY.THREAT.DETECTED Legacy event types: security.threat.detected Request from an IP identified as malicious by Okta ThreatInsight. This can be used to monitor and act on credential based attacks (such as Brute Force, Password Spray) on your organization. The reasons why the request was classified as malicious can be found in the outcome.reason field. The outcome.result field will be 'ALLOW', 'DENY' or 'RATE_LIMIT' based on whether Okta Threat Insight is configured in log mode or log and enforce mode, where 'ALLOW' means the request continued, 'DENY' means the request was blocked and 'RATE_LIMIT' means we protected your org from exceeding your rate limit by not allowing suspicious activity to count towards your rate limit. securitythreat-insight Since: 2019.02.2 SECURITY.VOICE.ADD_COUNTRY_BLACKLIST Legacy event types: security.voice.add_country_blacklist Fired when a country has been added to the voice call blacklist. This can be used to identify when a country has been blacklisted for voice call. When fired, this event contains information about the country that was added to the blacklist.Related events include security.voice.remove_country_blacklist. securityvoice Since: 2019.03.3 SECURITY.VOICE.REMOVE_COUNTRY_BLACKLIST Legacy event types: security.voice.remove_country_blacklist Fired when a country has been removed from the voice call blacklist. This can be used to identify when a country has been removed from voice call blacklist. When fired, this event contains information about the country that was removed from the blacklist.Related events include security.voice.add_country_blacklist. securityvoice Since: 2019.03.3 SECURITY.ZONE.MAKE_BLACKLIST Legacy event types: security.zone.make_blacklist Added IPs to blacklist zone. network-zonesecurity Since: 2017.06 SECURITY.ZONE.REMOVE_BLACKLIST Legacy event types: security.zone.remove_blacklist Removed IPs from blacklist zone. network-zonesecurity Since: 2017.06 SELF_SERVICE.DISABLED Legacy event types: app.self_service.disabled Self-service disabled for app. self-service Since: 2017.48 SELF_SERVICE.ENABLED Legacy event types: app.self_service.enabled Self-service enabled for app. self-service Since: 2017.48 SUPPORT.ORG.UPDATE Okta has updated the configuration or data within the Org. This can be used to identify modifications to an Org which are the result of an action by an Okta staff member. Such actions are typically taken in response to a customer request, such as request to enable an Early Access feature. In some cases, these actions may be the result of a review initiated by Okta, such as a review in response to a production service alert. See the supportAction object within the debugContext.debugData objection for more information about the type of update. support-audit Since: 2022.06.2 SUPPORT.ORG.VIEW Okta has viewed a page which contains customer data. This can be used to identify an action taken by an Okta staff member in the support tool which resulted in a view of customer data. Such actions are typically taken in response to a customer request, such as in the process of investigating an issue raised through a support case. In some cases, these actions may be the result of a review initiated by Okta, such as a review in response to a production service alert. See the supportAction object within the debugContext.debugData objection for more information about the type of update. support-audit Since: 2022.06.2 SYSTEM.AGENT.AD.CONNECT Legacy event types: app.ad.agent.disconnected, app.ad.agent.reconnected Connect AD agent to Okta. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.CREATE Legacy event types: app.ad.config.agent.agent_created Create AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.DEACTIVATE Legacy event types: app.ad.config.agent.agent_deactivated Deactivate AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.DELETE Legacy event types: app.ad.config.agent.agent_deleted Delete AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.IMPORT_OU Legacy event types: app.ad.api.user_import.warn.skipped_ou.missing_required_attribute Perform import OU by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.IMPORT_USER Legacy event types: app.ad.api.user_import.warn.skipped_user.attribute_too_long, app.ad.api.user_import.warn.skipped_user.internal_object, app.ad.api.user_import.warn.skipped_user.internal_object.unknown_user, app.ad.api.user_import.warn.skipped_user.invalid_user_account_control, app.ad.api.user_import.warn.skipped_user.invalid_user_account_control.unknown_user, app.ad.api.user_import.warn.skipped_user.invalid_user_account_control_computed, app.ad.api.user_import.warn.skipped_user.invalid_user_account_control_computed.unknown_user, app.ad.api.user_import.warn.skipped_user.missing_required_attribute, app.ad.api.user_import.warn.skipped_user.missing_required_attribute.unknown_user Perform import user by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.INVOKE_DIR Legacy event types: app.ad.agent.dir-invoke, app.ad.agent.dir-invoke.error Perform directory invoke command by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.REACTIVATE Legacy event types: app.ad.config.agent.agent_reactivate_failed_missing_token, app.ad.config.agent.agent_reactivated Reactivate AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.READ_CONFIG Legacy event types: app.ad.agent.read-config, app.ad.agent.read-config.error Perform config read by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.READ_DIRSYNC Legacy event types: app.ad.agent.read-dirsync, app.ad.agent.read-dirsync.error Perform dirsync read by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.READ_LDAP Legacy event types: app.ad.agent.read-ldap, app.ad.agent.read-ldap.error Perform LDAP read by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.READ_SCHEMA Legacy event types: app.ad.agent.read-schema, app.ad.agent.read-schema.error Perform schema read by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.READ_TOPOLOGY Legacy event types: app.ad.agent.read-forest-topology, app.ad.agent.read-forest-topology.error Directory agent performed topology import operation. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.REALTIMESYNC Legacy event types: app.ad.agent.real-time-sync, app.ad.agent.real-time-sync.error Perform RealTimeSync by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.RESET_USER_PASSWORD Legacy event types: app.ad.password.reset.failure, app.ad.password.reset.success, app.ad.password.reset.unlock-failed Perform user password reset by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.START Legacy event types: app.ad.agent.start Start AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.UNLOCK_USER_ACCOUNT Legacy event types: app.ad.user.account.unlock.failure, app.ad.user.account.unlock.success Perform unlock user account by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.UPDATE Legacy event types: app.ad.agent.config, app.ad.agent.config.error, app.ad.agent.modify-config, app.ad.agent.modify-config.error Update AD agent configuration. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.UPDATE_USER Legacy event types: app.ad.agent.user-auth-and-update, app.ad.agent.user-auth-and-update.error User Auth and Update. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.UPGRADE Legacy event types: app.ad.agent.upgrade, app.ad.agent.upgrade.error Upgrade AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.UPLOAD_IWA_LOG Legacy event types: iwa.agent.fetch-logs, iwa.agent.fetch-logs.error Fired when an AD agent has fetched and uploaded IWA agent log file. This event fires when the log file upload is successful or fails. This can be used to audit that logs files are being fetched successfully, have been uploaded successfully, and troubleshoot why an IWA log upload has failed. When fired, this event indicates whether a log file upload has been successful or failed. This event also indicates whether the event was initiated by the Okta system or a user. Related events: none, all debugging context is included in this event. ad-agent Since: 2019.02.1 SYSTEM.AGENT.AD.UPLOAD_LOG Legacy event types: app.ad.agent.fetch-logs, app.ad.agent.fetch-logs.error Upload AD agent log. ad-agent Since: 2016.20 SYSTEM.AGENT.AD.WRITE_LDAP Legacy event types: app.ad.agent.write-ldap, app.ad.agent.write-ldap.error Perform LDAP write by AD agent. ad-agent Since: 2016.20 SYSTEM.AGENT.AUTO_UPDATE Fired when an individual agent auto-update succeeds or fails. Confirms a successful agent auto-update, or provides troubleshooting information when the agent auto-update is unsuccessful. Indicates when an agent auto-update is successful or unsuccessful. ad-agentagent-pool Since: 2021.10.0 SYSTEM.AGENT.CONNECTOR.CONNECT Legacy event types: agents.connector_agent.agent_disconnected, agents.connector_agent.agent_reconnected Connect connector agent to Okta. connector-agent Since: 2016.20 SYSTEM.AGENT.CONNECTOR.DEACTIVATE Legacy event types: agents.connector_agent.agent_deactivated Deactivate connector agent. connector-agent Since: 2016.20 SYSTEM.AGENT.CONNECTOR.DELETE Legacy event types: agents.connector_agent.agent_deleted Delete connector agent. connector-agent Since: 2016.20 SYSTEM.AGENT.CONNECTOR.REACTIVATE Legacy event types: agents.connector_agent.agent_reactivate_failed_missing_token, agents.connector_agent.agent_reactivated Reactivate connector agent. connector-agent Since: 2016.20 SYSTEM.AGENT.LDAP.CHANGE_USER_PASSWORD Legacy event types: app.ldap.agent.password_change, app.ldap.agent.password_change.timeout Perform change user password by LDAP agent. ldap-app Since: 2016.20 SYSTEM.AGENT.LDAP.CREATE_USER_JIT Legacy event types: app.ldap.jit.ambiguous Perform create user JIT by LDAP agent. ldap-app Since: 2016.20 SYSTEM.AGENT.LDAP.DISCONNECT Legacy event types: app.ldap.agent.disconnected Disconnect LDAP agent from Okta. ldap-app Since: 2016.20 SYSTEM.AGENT.LDAP.REALTIMESYNC Fired when LDAP Delegated Authentication is used to sign in and a user profile is updated using RealTimeSync action. Can be used by admins to identify user profile changes resulting from corresponding changes in the LDAP directory. The previous name for this event was system.agent.ad.realtimesync. ldap-app Since: 2022.02.0 SYSTEM.AGENT.LDAP.RECONNECT Legacy event types: app.ldap.agent.reconnected Reconnect LDAP agent to Okta. ldap-app Since: 2016.20 SYSTEM.AGENT.LDAP.RESET_USER_PASSWORD Legacy event types: app.ldap.agent.password_reset, app.ldap.agent.password_reset.error, app.ldap.agent.password_reset.timeout, app.ldap.password.reset.constraint.error, app.ldap.password.reset.failed, app.ldap.password.reset.invalid.old.password, app.ldap.password.reset.succeeded, app.ldap.password.reset.systemic.error, app.ldap.password_reset.attribs_not_set, app.ldap.password_reset.new_confirm_password_empty, app.ldap.password_reset.new_password_empty, app.ldap.password_reset.old_new_passwords_equal, app.ldap.password_reset.old_password_empty, app.ldap.password_reset.passwords_do_not_match, app.ldap.password_reset.restriction.error LDAP agent performed a password reset. ldap-app Since: 2016.20 SYSTEM.AGENT.LDAP.UNLOCK_USER_ACCOUNT Legacy event types: app.ldap.unlock.account.failed, app.ldap.unlock.account.succeeded LDAP agent performed account unlock for User. ldap-app Since: 2016.45 SYSTEM.AGENT.LDAP.UPDATE_USER Fired when LDAP Delegated Authentication is used to sign in and a user profile is updated. Can be used by admins to identify user profile changes resulting from corresponding changes in the LDAP directory. The previous name for this event was system.agent.ad.update_user. ldap-app Since: 2021.10.0 SYSTEM.AGENT.LDAP.UPDATE_USER_PASSWORD Legacy event types: app.ldap.agent.password_update, app.ldap.agent.password_update.error Perform update user password by LDAP agent. ldap-app Since: 2016.20 SYSTEM.AGENT_POOLS.AUTO_UPDATE Fired when the status of an agent pool auto-update is changed. Confirms an agent pool auto-update status change and provides troubleshooting information. Indicates when the status of an agent pool auto-update is changed. ad-agentagent-pool Since: 2021.10.0 SYSTEM.API_TOKEN.CREATE Legacy event types: api.token.create Create API token. event-hook-eligibletoken Since: 2016.12 SYSTEM.API_TOKEN.ENABLE Legacy event types: api.token.enable Enable API token. token Since: 2016.12 SYSTEM.API_TOKEN.REVOKE Legacy event types: api.token.revoke Revoke API token. event-hook-eligibletoken Since: 2016.12 SYSTEM.API_TOKEN.UPDATE An API token has been updated. This event can be used to identify a change to an existing API token, such as a change to the applicable rate limits for the token. Details of the change can be found in the debugData. This event does not change whether the token is valid for use, for actions that impact validity see system.api_token.enable and system.api_token.revoke. token Since: 2022.07.0 SYSTEM.BETA.FEATURE.ENABLE Legacy event types: core.beta.feature.enable Fired when an admin has enabled a BETA feature. This can be used to understand the status of the BETA Feature and identify who has enabled it for an org. When fired, this event contains information about the enabled BETA Feature, as well as the admin who enabled it. adminself-service-feature-managementsystem Since: 2019.07.1 SYSTEM.BILLING.SMS_USAGE_SENT Legacy event types: core.billing.sms_usage_sent Indicates that a report for SMS usage was sent to the billing system. adminbilling Since: 2018.36 SYSTEM.BRAND.CREATE This event is fired when the brand resource is created. Developer and org admins can use this event to identify when the brand resource was created. The event contains information about the created brand. admin Since: 2023.01.0 SYSTEM.BRAND.DELETE This event is fired when a brand resource is deleted. Developer and org admins can use this event to identify when a brand resource was deleted. The event contains information about a deleted brand. admin Since: 2023.01.0 SYSTEM.BRAND.UPDATE This event is fired when the brand resource is updated. Developer and org admins can use this event to identify when the brand resource was updated. The event contains information regarding specific updates made to brand like "customPrivacyPolicyUrl". admin Since: 2021.08.0 SYSTEM.CAPTCHA.CREATE A captcha instance is created for Sign-in Widget. Indicates when a captcha instance was created. This event is fired when org admin creates a captcha instance. captchasystem Since: 2021.05.1 SYSTEM.CAPTCHA.DELETE A captcha instance is deleted. Indicates when a captcha instance was deleted. This event is fired when org admin deletes a captcha instance. captchasystem Since: 2021.05.1 SYSTEM.CAPTCHA.UPDATE A captcha instance is updated. Indicates when a captcha instance was updated. This event is fired when org admin updates a captcha instance. captchasystem Since: 2021.05.1 SYSTEM.CLIENT.CONCURRENCY_RATE_LIMIT.NOTIFICATION Notify when too many requests in flight for client. This can be used to notify whenever there are too many concurrent requests from a client without enforcing any violation. When fired, this event contains information about the request such as client, device and ip details. system Since: 2020.09.4 SYSTEM.CLIENT.CONCURRENCY_RATE_LIMIT.VIOLATION Too many requests in flight for client. This can be used to track if there are too many concurrent requests from a client. When fired, this event contains information about the request such as client, device and ip details. system Since: 2020.06.1 SYSTEM.CLIENT.RATE_LIMIT.NOTIFICATION Notify when client rate limits are exceeded. This can be used to notify whenever a client is exceeding its rate limit without enforcing any violation. When fired, this event contains information about the request such as client, device and ip details. system Since: 2020.09.4 SYSTEM.CLIENT.RATE_LIMIT.VIOLATION Client rate limit violation. This can be used to track if a client is exceeding its rate limit. When fired, this event contains information about the request such as client, device and ip details. system Since: 2020.06.1 SYSTEM.CSV.IMPORT_USER Legacy event types: app.csv.import_user.skipped_user, app.csv.import_user.skipped_user.unknown_user Import of user from CSV is skipped. Informs when import of a user from CSV has been skipped due to reasons such as missing required attributes or unknown unique identifier. This event is logged when import of a user is skipped during CSV directory import workflow for on-premises systems using Okta provisioning agent. system Since: 2018.28 SYSTEM.CUSTOM_ERROR.DELETE Custom error page is deleted. Can be used to identify when an admin has deleted the custom error page. Event fired when the custom error page is deleted. admin Since: 2023.01.0 SYSTEM.CUSTOM_ERROR.UPDATE Custom error page is updated. Can be used to identify when an admin has customized the error page. Event fired when the error page is successfully updated. admin Since: 2020.12.0 SYSTEM.CUSTOM_SIGNIN.DELETE Custom sign-in page is deleted. Can be used to identify when an admin has deleted the custom sign-in page. Event fired when custom sign-in page is deleted. admin Since: 2023.01.0 SYSTEM.CUSTOM_SIGNIN.UPDATE Custom sign-in page is updated. Can be used to identify when an admin has customized the sign-in page. Event fired when custom sign-in page is updated. admin Since: 2020.12.0 SYSTEM.CUSTOM_SIGNOUT.UPDATE Custom sign-out page is updated. Admin has updated the custom sign-out page. Event fired when custom sign-out page is updated. admin Since: 2023.01.0 SYSTEM.CUSTOM_URL_DOMAIN.CERT_RENEW Okta managed certificates for custom domain are renewed. Can be used to identify when okta managed certificate renewal batch job has renewed certificates for custom domain. When fired, the event contains information about the domain name and certificate source type. system Since: 2021.11.0 SYSTEM.CUSTOM_URL_DOMAIN.CERT_UPLOAD Custom domain certificates are uploaded by an admin or generated by Okta. Can be used to identify when custom domain certificates are uploaded by an admin or generated by Okta. When fired, the event contains information about the domain name and certificate source type. adminsystem Since: 2020.12.0 SYSTEM.CUSTOM_URL_DOMAIN.DELETE Custom domain is deleted. Can be used to identify when an admin has deleted their custom domain. When fired, the event contains information about the domain name that was deleted. admin Since: 2021.11.0 SYSTEM.CUSTOM_URL_DOMAIN.INITIATE Custom domain setup is initiated. Admin has initiated custom domain setup by inputting their custom domain for DNS verification. When fired, the event contains information about the domain name, certificate source type and domain validation status. admin Since: 2020.12.0 SYSTEM.CUSTOM_URL_DOMAIN.UPDATE Custom domain brand association is updated. Admin has updated the custom domain association with the brand. When fired, the event contains the domain name, certificate source type, domain validation status and information about the brand it is associated with. admin Since: 2023.01.0 SYSTEM.CUSTOM_URL_DOMAIN.VERIFY Custom domain name ownership successfully verified by Okta. Identifies when an admin has successfully verified the ownership of the domain name. When fired, the event contains information about the domain name, certificate source type and domain validation status. admin Since: 2020.12.0 SYSTEM.DIRECTORY.DEBUGGER.EXTEND Legacy event types: platform.directory.debugger.extend Extend Directory Debugger access for Okta support. This can be used to audit the Directory Debugger access extension. When fired, this event contains information about Directory Debugger access extension. agent Since: 2019.09.0 SYSTEM.DIRECTORY.DEBUGGER.GRANT Legacy event types: platform.directory.debugger.grant Grant Directory Debugger access for Okta support. This can be used to audit the Directory Debugger access grants to Okta support. When fired, this event contains information about Directory Debugger access grant. agent Since: 2019.09.0 SYSTEM.DIRECTORY.DEBUGGER.QUERY_EXECUTED Legacy event types: platform.directory.debugger.query.executed A read-only query executed against AD/LDAP instance by Okta support using the Directory Debugger tool. This can be used to audit the queries executed by Okta support using Directory Debugger. When fired, this event contains information about Directory Debugger query. agent Since: 2019.09.0 SYSTEM.DIRECTORY.DEBUGGER.REVOKE Legacy event types: platform.directory.debugger.revoke Revoke Directory Debugger access for Okta support. This can be used to audit the Directory Debugger access revoke. When fired, this event contains information about Directory Debugger access revoke. agent Since: 2019.09.0 SYSTEM.EMAIL.ACCOUNT_UNLOCK.SENT_MESSAGE Legacy event types: core.user.email.message_sent.self_service.account_unlock Send self-service account unlock email. email Since: 2016.13 SYSTEM.EMAIL.CHALLENGE_FACTOR_REDEEMED Legacy event types: system.email.challenge_factor_redeemed This event indicates that a user completed an email factor challenge. This can be used to identify when a credential sent in an email to a user has been redeemed (the link was clicked or the code was entered). When fired, this event contains information about the result. Success if successful or error reasons should be present for failure cases (e.g. incorrect code, timeout, expired, etc.). The event also contains a debugData with the action (the link was clicked or the code was entered). email Since: 2019.07.0 SYSTEM.EMAIL.DELIVERY An email's delivery status was updated. Used to notify admins of a bounced or dropped email. For certain bounce events, the context information may be lost by the email provider(s) due to email server communication delays. Such delayed bounce events will not appear in syslog. As of the 2022.08.0 release, this is also used to identify other email events e.g. delivered, deferred. See the event debugData for help identifying a remediation, such as updating an incorrect email address. emailevent-hook-eligible Since: 2022.05.0 SYSTEM.EMAIL.MFA_ENROLL_NOTIFICATION.SENT_MESSAGE Legacy event types: core.user.email.message_sent.mfa_enroll_notification MFA enrollment notification email sent. Used to notify admins MFA enrollment notification email has been sent. email Since: 2019.01.1 SYSTEM.EMAIL.MFA_RESET_NOTIFICATION.SENT_MESSAGE Legacy event types: core.user.email.message_sent.mfa_reset_notification MFA reset notification email sent. Used to notify admins MFA reset notification email has been sent. email Since: 2019.01.1 SYSTEM.EMAIL.NEW_DEVICE_NOTIFICATION.SENT_MESSAGE Legacy event types: core.user.email.message_sent.new_device_notification New device signin notification email sent. email Since: 2016.13 SYSTEM.EMAIL.PASSWORD_RESET.SENT_MESSAGE Legacy event types: core.user.email.message_sent.self_service.password_reset Send self-service password reset email. email Since: 2016.13 SYSTEM.EMAIL.SEND_FACTOR_VERIFY_MESSAGE Legacy event types: system.email.send_factor_verify_message An email was sent to a user for verification. Used to notify admins that an email was sent to a user for verification. When fired, this event contains information about the token lifetime in the debugData. email Since: 2019.07.0 SYSTEM.EMAIL.TEMPLATE.CREATE This event is fired when a custom email template is created. Developers and Org Admins can use this to identify when a default email template has been overridden with a new template. The event details can be used to identify the template type and template engine. Usually this event will precede "system.email.template.update" or "system.email.template.delete" events. adminemail Since: 2021.07.0 SYSTEM.EMAIL.TEMPLATE.DELETE This event is fired when a custom email template is deleted. Developers and Org Admins can use this to identify when a custom email template has been deleted to fall back to default template. The event details can be used to identify the template type and template engine. Usually this event will follow "system.email.template.create" or "system.email.template.update" events. adminemail Since: 2021.07.0 SYSTEM.EMAIL.TEMPLATE.SETTINGS_CHANGED This event is fired when the settings for an email template is changed. Developers and Org Admins can use this to identify when an email template setting has been changed. When fired, this event contains information about the email template and settings that were changed. adminemail Since: 2022.05.0 SYSTEM.EMAIL.TEMPLATE.UPDATE Legacy event types: system.email.template.update This event is fired when a custom email template has been updated. Developers and Org Admins can use this to identify when a custom email template has been updated. The event details can be used to identify the template type and template engine. Usually this event will follow "system.email.template.create" and precede "system.email.template.delete" events. adminemail Since: 2020.03.0 SYSTEM.EMAIL_DOMAIN.CREATE Email domain is created. Admin has initiated email domain setup by inputting their domain details for DNS verification. When fired, the event contains information about the domain name, display name, user name, brand id and validation status. admin Since: 2023.01.0 SYSTEM.EMAIL_DOMAIN.DELETE Email domain is deleted. Can be used to identify when an admin has deleted their email domain. When fired, the event contains information about the email domain that was deleted. admin Since: 2023.01.0 SYSTEM.EMAIL_DOMAIN.UPDATE Email domain is updated. Admin has updated the email domain. When fired, the event contains information about the email domain that was updated. admin Since: 2023.01.0 SYSTEM.EMAIL_DOMAIN.VERIFY Email domain is successfully verified by Okta. Identifies when an admin has successfully verified the email domain. When fired, the event contains information about the email domain that was verified. admin Since: 2023.01.0 SYSTEM.FEATURE.DISABLE Legacy event types: core.feature.disable Fired when self service features are requested to be disabled by admins. Use to determine who enabled the features and any limitations the features have. When fired, this event contains information about the requested features, their names and lifecycle state, the admin who made the change, and any possible limitations associated with the features. Related events include 'system.feature.enable'. adminself-service-feature-managementsystem Since: 2019.05.0 SYSTEM.FEATURE.EA_AUTO_ENROLL Legacy event types: core.feature.auto_enroll Fired when an org has subscribed to or unsubscribed from EA Feature Auto Enroll. This can be used to understand the status of EA Feature Auto Enroll subscription and identify who has made changes to the subscription. When fired, this event contains information about the status of EA Feature Auto enroll subscription, as well as the admin who made any subscription changes. adminself-service-feature-managementsystem Since: 2019.03.1 SYSTEM.FEATURE.ENABLE Legacy event types: core.feature.enable Fired when self service features are requested to be enabled by admins. Use to determine who enabled the features and any limitations the features have. When fired, this event contains information about the requested features, their names and lifecycle state, the admin who made the change, and any possible limitations associated with the features. Related events include 'system.feature.disable'. adminself-service-feature-managementsystem Since: 2019.05.0 SYSTEM.HOOK.KEY.CREATED Create a new hook key. This event can be used to identify when an admin created a new hook key. When triggered, this events contains information about the created hook key. hook-key Since: 2022.10.2 SYSTEM.HOOK.KEY.DELETED Delete a hook key. This event can be used to identify when an admin deleted a hook key. When triggered, this events contains information about the deleted hook key. hook-key Since: 2022.10.2 SYSTEM.HOOK.KEY.UPDATED Update a hook key. This event can be used to identify when an admin updated a hook key. When triggered, this events contains information about the updated hook key. hook-key Since: 2022.10.2 SYSTEM.IDP.LIFECYCLE.ACTIVATE Fired when an Identity provider is activated. This can be used to audit that an identity provider has been activated. When fired, this event indicates an Identity provider was activated. This event also indicates the type of the identity provider that was activated. idp Since: 2020.09.1 SYSTEM.IDP.LIFECYCLE.CREATE Fired when a new Identity provider is created. This can be used to audit that a new identity provider has been created. When fired, this event indicates an Identity provider was successfully created. This event also indicates the type of the identity provider that was created. idp Since: 2020.09.1 SYSTEM.IDP.LIFECYCLE.DEACTIVATE Fired when an Identity provider is deactivated. This can be used to audit that an identity provider has been deactivated. When fired, this event indicates an Identity provider has been deactivated. This event also indicates the type of the identity provider that was deactivated. idp Since: 2020.09.1 SYSTEM.IDP.LIFECYCLE.DELETE Fired when an Identity provider is deleted. This can be used to audit that an identity provider has been deleted. When fired, this event indicates an Identity provider was deleted. This event also indicates the type of the identity provider that was deleted. idp Since: 2020.09.1 SYSTEM.IDP.LIFECYCLE.UPDATE Fired when an Identity provider is updated. This can be used to audit that an identity provider configuration has been updated. When fired, this event indicates an Identity provider configuration was updated. This event also indicates the type of the identity provider that was updated. idp Since: 2020.09.1 SYSTEM.IMPORT.CLEAR.UNCONFIRMED.USERS.SUMMARY Legacy event types: system.import.clear.unconfirmed.users.summary Clear Unconfirmed Imported Users. Can be used for clearing unconfirmed imported users from last import result. Note that a single event is fired for clearing unconfirmed imported users instead of fire delete event on each user. app Since: 2019.01.1 SYSTEM.IMPORT.COMPLETE Legacy event types: app.generic.import.complete Import process complete. event-hook-eligibleimportsystem Since: 2016.14 SYSTEM.IMPORT.COMPLETE_BATCH Legacy event types: app.generic.import.batch.complete Batch import process complete. importsystem Since: 2016.14 SYSTEM.IMPORT.CUSTOM_OBJECT.COMPLETE Legacy event types: app.generic.import.summary.custom_object Import of custom objects completed. importsystem Since: 2016.14 SYSTEM.IMPORT.CUSTOM_OBJECT.CREATE Legacy event types: app.generic.import.details.add_custom_object Create custom object triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.CUSTOM_OBJECT.DELETE Legacy event types: app.generic.import.details.update_custom_object Delete custom object triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.CUSTOM_OBJECT.UPDATE Legacy event types: app.generic.import.details.delete_custom_object Update custom object triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.DOWNLOAD.COMPLETE Legacy event types: system.import.download.complete Fired at the completion of the download objects phase, when the objects (users, groups, devices) to be imported have been downloaded from the system of record. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired at the completion of the download objects phase, when the objects (users, groups, devices) to be imported have been downloaded from the system of record. importsystem Since: 2020.01.0 SYSTEM.IMPORT.DOWNLOAD.START Legacy event types: system.import.download.start Fired at the start of the download objects phase, when the objects (users, groups, devices) to be imported are being downloaded from the system of record. This can be used to determine when an import has started, as well as to monitor to trigger processes that should run concurrently with the import. Fired at the start of the download objects phase, when the objects (users, groups, devices) to be imported are being downloaded from the system of record. importsystem Since: 2020.01.0 SYSTEM.IMPORT.GROUP.COMPLETE Legacy event types: app.generic.import.summary.group Import of groups completed. importsystem Since: 2016.14 SYSTEM.IMPORT.GROUP.CREATE Legacy event types: app.generic.import.details.add_group Create group triggered by import process. event-hook-eligibleimportsystem Since: 2016.14 SYSTEM.IMPORT.GROUP.DELETE Legacy event types: app.generic.import.details.delete_group Remove group triggered by import process. event-hook-eligibleimportsystem Since: 2016.14 SYSTEM.IMPORT.GROUP.START Legacy event types: app.generic.import.import_groups Start importing groups from refreshing AppGroups. importsystem Since: 2016.14 SYSTEM.IMPORT.GROUP.UPDATE Legacy event types: app.generic.import.details.update_group Update group triggered from import process. importsystem Since: 2016.14 SYSTEM.IMPORT.GROUP_MEMBERSHIP.COMPLETE Legacy event types: app.generic.import.summary.group_membership Import of application group members completed. importsystem Since: 2016.14 SYSTEM.IMPORT.IMPLICIT_DELETION.COMPLETE Legacy event types: system.import.implicit_deletion.complete Fired upon completion of the implicit deletion phase, when Okta checks for the deletion of users, groups, and custom objects. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired upon completion of the implicit deletion phase, when Okta checks for the deletion of users, groups, and custom objects. importsystem Since: 2020.01.0 SYSTEM.IMPORT.IMPLICIT_DELETION.START Legacy event types: system.import.implicit_deletion.start Fired at the start of the implicit deletion phase, when Okta checks for the deletion of users, groups, and custom objects. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired at the start of the implicit deletion phase, when Okta checks for the deletion of users, groups, and custom objects. importsystem Since: 2020.01.0 SYSTEM.IMPORT.IMPORT_PROFILE Legacy event types: app.user_management.importing_profile, app.user_management.importing_profile_failed.email_length, app.user_management.importing_profile_failed.missing_externalid, app.user_management.importing_profile_failed.precomputed_login_length Import user profile triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.IMPORT_PROVISIONING_INFO Legacy event types: app.generic.import.provisioning_data Import provisioning info triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.MEMBERSHIP_PROCESSING.COMPLETE Legacy event types: system.import.membership_processing.complete Fired upon completion of the membership processing phase, when Okta checks which groups users being imported into Okta should be added to/removed from. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired upon completion of the membership processing phase, when Okta checks which groups users being imported into Okta should be added to/removed from. importsystem Since: 2020.01.0 SYSTEM.IMPORT.MEMBERSHIP_PROCESSING.START Legacy event types: system.import.membership_processing.start Fired at the start of the membership processing phase, when Okta checks which groups users being imported into Okta should be added to/removed from. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired at the start of the membership processing phase, when Okta checks which groups users being imported into Okta should be added to/removed from. importsystem Since: 2020.01.0 SYSTEM.IMPORT.OBJECT_CREATION.COMPLETE Legacy event types: system.import.object_creation.complete Fired upon completion of the object creation phase, when the first batch of objects is created/updated. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired upon completion of the object creation phase, when the first batch of objects is created/updated. importsystem Since: 2020.01.0 SYSTEM.IMPORT.OBJECT_CREATION.START Legacy event types: system.import.object_creation.start Fired at the completion of the download objects phase, when the objects (users, groups, devices) to be imported have been downloaded from the system of record. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired at the completion of the download objects phase, when the objects (users, groups, devices) to be imported have been downloaded from the system of record. importsystem Since: 2020.01.0 SYSTEM.IMPORT.ROADBLOCK Legacy event types: app.generic.import.fail.roadblock Import roadblock triggered due to exceeded threshold. event-hook-eligibleimportsystem Since: 2016.14 SYSTEM.IMPORT.ROADBLOCK.RESCHEDULE_AND_RESUME Legacy event types: app.generic.import.fail.roadblock.reschedule_and_resume The affected import from AppInstance has been rescheduled. All other imports will resume. importsystem Since: 2017.19 SYSTEM.IMPORT.ROADBLOCK.RESUME Legacy event types: app.generic.import.fail.roadblock.resume The affected import from AppInstance has been canceled. All other imports will resume. importsystem Since: 2017.19 SYSTEM.IMPORT.ROADBLOCK.UPDATED Legacy event types: system.import.roadblock.updated Fired when an import roadblock (aka, Import Safeguard) has been updated. This event can be used to identify when an admin updated the Max Import Unassignment roadblock setting, and what the setting was updated to. This event includes details on what the roadblock was updated to and who made the change. importsystem Since: 2019.11.0 SYSTEM.IMPORT.SESSION.CANCELLED Cancel an import session. This event can be used to identify when an admin cancel import session. This event includes details when the import session be canceled. importsystem Since: 2022.10.0 SYSTEM.IMPORT.SESSION.CREATED Create a new import session. This event can be used to identify when an admin start new import session. This event includes details when the import process be created. importsystem Since: 2022.10.0 SYSTEM.IMPORT.SESSION.EXPIRED Expired an import session. This event can be used to identify when the session is expired. This event includes details when the session is expired. importsystem Since: 2022.10.0 SYSTEM.IMPORT.SESSION.TRIGGERED Triggered an import session to start importing. This event can be used to identify when an admin trigger the import job from an open session. This event includes details when the import process be triggered. importsystem Since: 2022.10.0 SYSTEM.IMPORT.START Legacy event types: app.generic.import.started import started. event-hook-eligibleimportsystem Since: 2016.14 SYSTEM.IMPORT.USER.COMPLETE Legacy event types: app.generic.import.summary.user Import of user completed. importsystem Since: 2016.14 SYSTEM.IMPORT.USER.CREATE Legacy event types: app.generic.import.details.add_user Create user triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.USER.DELETE Legacy event types: app.generic.import.details.delete_user Delete user triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.USER.MATCH Legacy event types: app.generic.import.details.match_user Assign user triggered by import process with callback. This event can be used to alter the matching result for a given imported user. This event is fired when the matching result is altered by the synchronous callback. importsystem Since: 2018.43 SYSTEM.IMPORT.USER.START Legacy event types: app.generic.import.import_user Start importing users triggered import process. importsystem Since: 2016.14 SYSTEM.IMPORT.USER.SUSPEND Legacy event types: app.generic.import.details.suspend_user Suspend user triggered by import process. importsystem Since: 2016.24 SYSTEM.IMPORT.USER.UNSUSPEND Legacy event types: app.generic.import.details.unsuspend_user Unsuspend user triggered by import process. importsystem Since: 2016.24 SYSTEM.IMPORT.USER.UNSUSPEND_AFTER_CONFIRM Legacy event types: app.generic.import.user_match.unsuspend_after_confirm, app.user_management.unsuspend_user_after_confirm_failed No Description importsystem Since: 2016.24 SYSTEM.IMPORT.USER.UPDATE Legacy event types: app.generic.import.details.update_user Update user triggered by import process. importsystem Since: 2016.14 SYSTEM.IMPORT.USER.UPDATE_USER_LIFECYCLE_FROM_MASTER Legacy event types: app.user_management.update_user_lifecycle_from_master_failed Update user status triggered by import process. importsystem Since: 2016.24 SYSTEM.IMPORT.USER_CSV.COMPLETE Bulk Import users from CSV is completed. Informs when bulk user import from CSV has been completed. This event is logged when bulk user import from CSV has completed with the outcome as success or failure. When fired, this event also contains debug context about the number of users added/updated/unchanged or with errors. admincsv-uploaduser-import Since: 2021.01.2 SYSTEM.IMPORT.USER_CSV.START Bulk Import of users from CSV is started. Informs when bulk import of users from CSV has been attempted to be uploaded. This event is logged when bulk user import from CSV has started and is a precursor to user.lifecycle.create; user.lifecycle.activate events. admincsv-uploaduser-import Since: 2021.01.2 SYSTEM.IMPORT.USER_MATCHING.COMPLETE Legacy event types: system.import.user_matching.complete Fired upon completion of the user matching phase, when Okta attempts to match imported users to existing Okta users. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired upon completion of the user matching phase, when Okta attempts to match imported users to existing Okta users. importsystem Since: 2020.01.0 SYSTEM.IMPORT.USER_MATCHING.START Legacy event types: system.import.user_matching.start Fired at the start of the user matching phase, when Okta attempts to match imported users to existing Okta users. This can be used to determine the progress of an import, as well as to monitor to trigger processes that should run concurrently with the import. Fired at the start of the user matching phase, when Okta attempts to match imported users to existing Okta users. importsystem Since: 2020.01.0 SYSTEM.IWA.CREATE Legacy event types: iwa.created_successfully, iwa.creating_failed Create IWA agent. iwasystem Since: 2016.13 SYSTEM.IWA.GO_OFFLINE Legacy event types: iwa.ad_agents_went_offline IWA going offline. iwasystem Since: 2016.13 SYSTEM.IWA.GO_ONLINE Legacy event types: iwa.went_online IWA going online. iwasystem Since: 2016.13 SYSTEM.IWA.PROMOTE_PRIMARY Legacy event types: iwa.no_agents_promoted_to_primary, iwa.promoted_to_primary Promote IWA agent to primary. iwasystem Since: 2016.13 SYSTEM.IWA.REMOVE Legacy event types: iwa.removed Remove IWA agent. iwasystem Since: 2016.13 SYSTEM.IWA.UPDATE Legacy event types: iwa.updated_successfully, iwa.updating_failed Update IWA agent. iwasystem Since: 2016.13 SYSTEM.IWA.USE_DEFAULT Legacy event types: iwa.primary_not_found No primary IWA app found. Using default login. iwasystem Since: 2016.13 SYSTEM.IWA_AGENTLESS.AUTH Legacy event types: iwa.agentless.auth.failure, iwa.agentless.auth.success Agentless IWA authentication. iwasystem Since: 2018.22 SYSTEM.IWA_AGENTLESS.AUTH_AFTER_REDIRECT Fired after redirection from Agentless DSSO failure. This can be used to track the start of a subsequent authentication request after Agentless DSSO fails. This can also be used for end-to-end tracking of an ADSSO failure to the subsequent authentication it is redirected to by searching for the common stateTokenHash. When fired, this event contains the stateTokenHash which will be common before and after the redirection occurs. iwasystem Since: 2022.11.2 SYSTEM.IWA_AGENTLESS.REDIRECT Legacy event types: iwa.agentless.auth.redirect.defaultloginpage, iwa.agentless.auth.redirect.onpremiwa Fired when an Agentless DSSO authentication request is redirected to an onprem IWA authentication or the default login page. This can be used to identify when an agentless authentication request resulted in a redirect to an onprem IWA or default login page. This can also be used to identify the potential cause of the redirect. When fired, this event identifies the cause of the redirection. When a custom error page is defined, a redirect event is not always generated when a redirection occurs. iwasystem Since: 2019.05.4 SYSTEM.IWA_AGENTLESS.UPDATE Legacy event types: iwa.agentless.update.failure, iwa.agentless.update.success Update to agentless IWA. iwasystem Since: 2018.22 SYSTEM.IWA_AGENTLESS.USER.NOT_FOUND Legacy event types: iwa.agentless.auth.failed.client_principal_id.invalid, iwa.agentless.auth.failed.user.multiple_user_found, iwa.agentless.auth.failed.user.not_found Fired when a user could not be found during Agentless DSSO authentication, resulting in an authentication failure. This can be used to identify when an agentless authentication request resulted in a failure. The failure could be due to the user not being found in Okta, Okta not being able to connect to AD, or the user not being found in AD. This can also be used to identify the potential cause of the failure. When fired, this event contains information about the potential cause of the failure. iwasystem Since: 2019.08.0 SYSTEM.IWA_AGENTLESS_KERBEROS.UPDATE Legacy event types: iwa.agentless.kerberos.update.failure, iwa.agentless.kerberos.update.success Fires when a Kerberos realm settings is updated by an admin. This event fires when the update is successful or fails. This can be used to audit Kerberos realm setting, and troubleshoot why Kerberos authentication failed. When fired, this event indicates whether Kerberos realm setting update has been successful or failed. This event also indicates the initiator of the event and the current setting for Kerberos Realm. Related events: none, all debugging context is included in this event. iwasystem Since: 2019.05.4 SYSTEM.LDAPI.ADMIN_LIMIT_EXCEEDED This event indicates that an administrative limit was exceeded when processing an LDAP interface operation. It can be used to audit and debug failures caused by exceeding an administrative limit. This event may occur periodically when an LDAP operation results in a large number of corresponding actions in the Okta directory. These errors are often temporary and will subside when Okta has processed the actions. Contact Okta support if you see such errors consistently over the course of a day or more. ldapi Since: 2023.03.0 SYSTEM.LDAPI.BIND Legacy event types: system.ldapi.bind Fired when a user performs a BIND to LDAP Interface. Can be used to identify when a user attempted to perform an LDAP authentication for audit or debugging purposes. Note that the firing of this event is subject to LDAPi event filtering rules. ldapi Since: 2018.10 SYSTEM.LDAPI.SEARCH Legacy event types: system.ldapi.search Fired when a user performs a SEARCH to LDAP Interface. Can be used to identify when a user attempted to perform a search on LDAP Interface for audit or debugging purposes. Note that the firing of this event is subject to LDAPi event filtering rules. ldapi Since: 2018.10 SYSTEM.LDAPI.UNBIND Legacy event types: system.ldapi.unbind Fired when a user performs an UNBIND to LDAP Interface. Can be used to identify when a user attempted to end an LDAP Interface session for audit or debugging purposes. Note that the firing of this event is subject to LDAPi event filtering rules. ldapi Since: 2018.10 SYSTEM.LOG_STREAM.LIFECYCLE.ACTIVATE Log stream activated. This event can be used to track and audit when a user activates a log stream. When fired, this event indicates that a user activated a log stream configuration. event-hook-eligiblelog-stream Since: 2021.09.1 SYSTEM.LOG_STREAM.LIFECYCLE.CREATE Log stream created. This event can be used to track and audit when a user creates a log stream. When fired, this event indicates that a user created a log stream configuration. event-hook-eligiblelog-stream Since: 2021.09.1 SYSTEM.LOG_STREAM.LIFECYCLE.DEACTIVATE Log stream deactivated. This event can be used to track and audit when a user or Okta deactivates a log stream. When fired, this event indicates that a user or Okta deactivated a log stream configuration. event-hook-eligiblelog-stream Since: 2021.09.1 SYSTEM.LOG_STREAM.LIFECYCLE.DELETE Log stream deleted. This event can be used to track and audit when a user deletes a log stream. When fired, this event indicates that a user deleted a log stream configuration. event-hook-eligiblelog-stream Since: 2021.09.1 SYSTEM.LOG_STREAM.LIFECYCLE.UPDATE Log stream updated. This event can be used to track and audit when a user updates a log stream. When fired, this event indicates that a user updated a log stream configuration. event-hook-eligiblelog-stream Since: 2021.09.1 SYSTEM.MFA.FACTOR.ACTIVATE Activate a new authentication factor. Can be used to identify when an admin has enabled a new factor for authentication. When fired the event will contain details of which factor is enabled. adminmfa Since: 2021.01.1 SYSTEM.MFA.FACTOR.DEACTIVATE Deactivate MFA factor. Can be used to identify when an admin has disabled a factor for MFA. When fired the event will contain details of which factor is disabled. adminmfa Since: 2021.01.1 SYSTEM.OPERATION.CONCURRENCY_LIMIT.VIOLATION Operation concurrency limit violation. This can be used to track if there are too many concurrent operations of the given type. The operation type information is available in debugData. When fired, this event contains information about the operation such as its actor, type, scope and threshold details. OperationRateLimitType in debugData will indicate the category to which the concurrency limit is being applied (e.g. web_request), OperationRateLimitSubtype defines specific subtypes (e.g. ssws_token) and OperationRateLimitScope will indicate the scope of the rate limit (e.g. token). system Since: 2022.07.0 SYSTEM.OPERATION.RATE_LIMIT.VIOLATION Operation rate limit violation. This can be used to track if an operation is exceeding its rate limit. When fired, this event contains information about the operation such as actor, type, scope and threshold details. OperationRateLimitType in debugData will indicate the category to which the rate limit is being applied (e.g. authenticator_otp_verification), OperationRateLimitSubtype defines specific subtypes (e.g. Email Factor for authenticator_otp_verification) and OperationRateLimitScope will indicate the scope of the rate limit (e.g. user or org level). Formerly, this event was used to indicate blocked SMS/Call transactions, please see system.sms.send*/system.voice.send* for blocked transactions. system Since: 2020.12.0 SYSTEM.OPERATION.RATE_LIMIT.WARNING Operation rate limit warning. This can be used to track if an operation is approaching its rate limit. When fired, this event contains information about the operation such as actor, type, scope and threshold details. OperationRateLimitType in debugData will indicate the category to which the rate limit is being applied (e.g. authenticator_otp_verification), OperationRateLimitSubtype defines specific subtypes (e.g. Email, SMS or Voice call for authenticator_otp_verification type) and OperationRateLimitScope will indicate the scope of the rate limit (e.g. user or org level). system Since: 2021.01.2 SYSTEM.ORG.CAPTCHA.ACTIVATE Enable org-wide captcha support. Indicates when org-wide captcha support is enabled, for which pages and using which captcha instance. This event is fired when org admin enables org-wide captcha for any supported pages. captchasystem Since: 2021.05.1 SYSTEM.ORG.CAPTCHA.DEACTIVATE Disable org-wide captcha support. Indicates when org-wide captcha support is disabled. This event is fired when org admin disables org-wide captcha support for all pages. captchasystem Since: 2021.05.1 SYSTEM.ORG.LIFECYCLE.CREATE Legacy event types: core.org.config.org_creation.failure, core.org.config.org_creation.success Org creation. system Since: 2016.51 SYSTEM.ORG.RATE_LIMIT.BURST Fired when burst rate limit capacity is activated. This can be used to identify when an API in the Org exceeds standard rate limits and the frequency with which the activities occur. This event is fired after a corresponding warning event. If usage continues on this API the risk is hitting a rate limit violation which will fire a corresponding violation event. The event contains a burst rate limit threshold which informs how much capacity is remaining before a violation occurs. system Since: 2022.02.0 SYSTEM.ORG.RATE_LIMIT.EXPIRATION.WARNING Legacy event types: core.framework.ratelimit.expiration.warning Rate limit approaching expiration date. system Since: 2018.35 SYSTEM.ORG.RATE_LIMIT.VIOLATION Legacy event types: core.framework.ratelimit.exceeded Rate limit violation. event-hook-eligiblesystem Since: 2017.02 SYSTEM.ORG.RATE_LIMIT.WARNING Legacy event types: core.framework.ratelimit.warning Rate limit warning. event-hook-eligiblesystem Since: 2017.02 SYSTEM.ORG.TASK.REMOVE Legacy event types: core.org.task.remove Tasks removed. system Since: 2017.33 SYSTEM.PUSH.SEND_FACTOR_VERIFY_PUSH Fired when a Push notification is sent to a device. Used to notify admins when a push was sent to a user for verification. Note that this event is fired whenever a Push is sent. push Since: 2020.06.3 SYSTEM.SMS.RECEIVE_STATUS Fired when receiving a status update on SMS message from provider. This event can be used by Org Admins to identify users that are/aren't getting one-time passcodes delivered successfully via SMS, provider status can be obtained from status field in debug data. For any system.sms.send_* event, there should be exactly one of this event. sms Since: 2020.08.4 SYSTEM.SMS.SEND_ACCOUNT_UNLOCK_MESSAGE Legacy event types: core.user.sms.message_sent.self_service.account_unlock Send self-service account unlock SMS message. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. smssystem Since: 2016.12 SYSTEM.SMS.SEND_FACTOR_VERIFY_MESSAGE Legacy event types: core.user.sms.message_sent.factor Send second factor auth SMS. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. smssystem Since: 2016.12 SYSTEM.SMS.SEND_OKTA_PUSH_VERIFY_MESSAGE Legacy event types: core.user.sms.message_sent.push_verify.activation Send activate Okta Verify Push for mobile SMS. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. smssystem Since: 2016.12 SYSTEM.SMS.SEND_PASSWORD_RESET_MESSAGE Legacy event types: core.user.sms.message_sent.self_service.password_reset Send self-service password reset SMS message. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. smssystem Since: 2016.12 SYSTEM.SMS.SEND_PHONE_VERIFICATION_MESSAGE Legacy event types: core.user.sms.message_sent.verify Send phone verification SMS message. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. event-hook-eligiblesmssystem Since: 2016.12 SYSTEM.THEME.UPDATE This event is fired when the theme resource is updated. Developer and org admins can use this event to identify when and how the theme resource was updated. Event details can be used to identify changes made to theme assets including updates to theme hex codes, logo, background image, and favicon. This event also tracks which combination of theme assets was applied to end users pages such as the sign-in page, error pages, and email templates. admin Since: 2021.08.0 SYSTEM.VOICE.RECEIVE_STATUS Fired when receiving a status update on voice call from provider. This event can be used by Org Admins to identify users that are/aren't getting one-time passcodes delivered successfully via voice call, provider status can be obtained from status field in debug data. For any system.voice.send_* event, there should be exactly one of this event. voice Since: 2020.08.4 SYSTEM.VOICE.SEND_ACCOUNT_UNLOCK_CALL Legacy event types: core.user.call_to_send_otp.message_sent.self_service.account_unlock Send self-service account unlock call. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. voice Since: 2017.44 SYSTEM.VOICE.SEND_CALL Legacy event types: core.user.call_made.factor Send phone call. voice Since: 2017.44 SYSTEM.VOICE.SEND_MFA_CHALLENGE_CALL Legacy event types: core.user.call_to_send_otp.message_sent.mfa.challenge Send second factor auth call. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. voice Since: 2017.44 SYSTEM.VOICE.SEND_PASSWORD_RESET_CALL Legacy event types: core.user.call_to_send_otp.message_sent.self_service.password_reset Send self-service password reset call. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. voice Since: 2017.44 SYSTEM.VOICE.SEND_PHONE_VERIFICATION_CALL Legacy event types: core.user.call_to_send_otp.message_sent.verify Send phone verification call. As of the 2022.06.0 release this event is also used to identify transactions blocked by Okta, which is indicated by a "deny" outcome. Previously, the system.operation.rate_limit.violation was used to identify blocked transactions. Additionally, the method of generating the MobilePhone ID in the event has changed for Okta Classic. It has not changed for Okta Identity Engine. event-hook-eligiblevoice Since: 2017.44 TASK.LIFECYCLE.ACTIVATE Legacy event types: platform.task.lifecycle.activate Activated system task. task Since: 2018.15 TASK.LIFECYCLE.CREATE Legacy event types: platform.task.lifecycle.create Created system task. task Since: 2018.15 TASK.LIFECYCLE.DEACTIVATE Legacy event types: platform.task.lifecycle.deactivate Deactivated system task. task Since: 2018.15 TASK.LIFECYCLE.DELETE Legacy event types: platform.task.lifecycle.delete Deleted system task. task Since: 2018.15 TASK.LIFECYCLE.UPDATE Legacy event types: platform.task.lifecycle.update Updated system task. task Since: 2018.15 USER.ACCOUNT.LOCK Legacy event types: core.user_auth.account_locked Auto-lock user account for Okta. accountevent-hook-eligibleuser Since: 2016.02 USER.ACCOUNT.LOCK.LIMIT Legacy event types: user.account.lock.limit This event is fired when a user account has reached the lockout limit. The account will not auto-unlock and a user or client cannot gain access to the account. This event indicates an account that will not be able to log in until remedial action is taken by the account admin. This event can be used to understand the specifics of an account lockout. Often this indicates a client application that is repeatedly attempting to authenticate with invalid credentials such as an old password. accountuser Since: 2019.05.0 USER.ACCOUNT.PRIVILEGE.GRANT Legacy event types: core.user.admin_privilege.granted A User's admin privileges changed. This can be used to audit the provisioning of admin privileges for users. When fired, this event contains information about the type of admin privileges the user currently has. The list of current privileges contain both individually assigned roles as well as the ones granted to the user through their group membership. Related events include: USER_ACCOUNT_PRIVILEGE_REVOKE. event-hook-eligibleuser Since: 2016.15 USER.ACCOUNT.PRIVILEGE.REVOKE Legacy event types: core.user.admin_privilege.revoked All of user's admin privilege revoked. This can be used to audit the deprovisioning of admin privileges from users. When fired, this event indicates the user has no more admin privileges. All of user's privileges were revoked including individually assigned roles as well as the ones granted to the user through their group membership. Related events include: USER_ACCOUNT_PRIVILEGE_GRANT. event-hook-eligibleuser Since: 2016.15 USER.ACCOUNT.REPORT_SUSPICIOUS_ACTIVITY_BY_ENDUSER Legacy event types: core.user.account.report_suspicious_activity_by_enduser User reported suspicious activity. This event is used to identify user account suspicious activity. event-based-trigger-eligibleevent-hook-eligibleuser Since: 2019.01.1 USER.ACCOUNT.RESET_PASSWORD Legacy event types: core.user.config.user_status.password_reset, core.user_auth.self_service.password_reset, core.user_auth.self_service.password_reset.invalid_recovery_token, core.user_auth.self_service.password_reset.invalid_security_answer, core.user_auth.self_service.password_reset.invalid_sms_code, core.user_auth.self_service.password_reset.invalid_user_state, core.user_auth.self_service.password_reset.issued_recovery_token, core.user_auth.self_service.password_reset.shared_email, core.user_auth.self_service.password_reset.suspended_user, core.user_auth.self_service.password_reset.unknown_user Fired when the user's Okta password is reset. accountevent-hook-eligibleuser Since: 2016.15 USER.ACCOUNT.UNLOCK Legacy event types: core.user_auth.account_auto_unlocked, core.user_auth.self_service.account_unlock, core.user_auth.self_service.account_unlock.already_unlocked, core.user_auth.self_service.account_unlock.invalid_recovery_token, core.user_auth.self_service.account_unlock.invalid_security_answer, core.user_auth.self_service.account_unlock.invalid_sms_code, core.user_auth.self_service.account_unlock.shared_email, core.user_auth.self_service.account_unlock.unknown_user Auto-unlock user account for Okta. accountevent-hook-eligibleuser Since: 2016.15 USER.ACCOUNT.UNLOCK_BY_ADMIN Legacy event types: core.user_auth.account_unlocked_by_admin User account unlock by admin. accountuser Since: 2016.15 USER.ACCOUNT.UNLOCK_FAILURE Legacy event types: core.user_auth.user.account.unlock_failure Failed to schedule unlock job for user. accountuser Since: 2018.23 USER.ACCOUNT.UNLOCK_TOKEN Legacy event types: core.user_auth.self_service.account_unlock.issued_recovery_token Issued recovery token for self-service account unlock. accountuser Since: 2017.47 USER.ACCOUNT.UPDATE_PASSWORD Legacy event types: core.user.config.password_update.failure, core.user.config.password_update.success User update password for Okta. accountend-user-visibleevent-hook-eligibleuser Since: 2016.15 USER.ACCOUNT.UPDATE_PRIMARY_EMAIL Legacy event types: core.user.config.update_primary_email User primary email updated. accountend-user-visibleuseruser-config Since: 2018.05 USER.ACCOUNT.UPDATE_PROFILE Legacy event types: core.user.config.profile_update.success Update user profile for Okta. accountevent-hook-eligibleuseruser-config Since: 2016.02 USER.ACCOUNT.UPDATE_SECONDARY_EMAIL Legacy event types: core.user.config.update_secondary_email User secondary email updated. accountend-user-visibleuseruser-config Since: 2018.25 USER.ACCOUNT.UPDATE_USER_TYPE Fires when a user changes from one type to another. Can be used to audit when a user gets converted from a contractor to a full-time employee, for example. Data includes the old and new type ids. There may be an accompanying update_profile event if values were changed. accountuseruser-config Since: 2020.02.0 USER.ACCOUNT.USE_TOKEN Legacy event types: core.user_auth.self_service.invalid_recovery_token Invalid self service recovery token used by user. accountuser Since: 2016.15 USER.AUTHENTICATION.AUTH Legacy event types: core.user_auth.invalid_certificate, core.user_auth.login_failed, core.user_auth.login_success Authenticate user. user Since: 2016.02 USER.AUTHENTICATION.AUTH_UNCONFIGURED_IDENTIFIER Fired after a user authenticates via a directory instance that is not the highest priority profile source for the user. This can be used to track users that are using an identifier to login which is different from the admin configured identifier for that user which might result in unexpected login results. When fired, this event will contain useful information about the user, the directory instance that was used to login the user, and the directory instance that should have been used instead. directoryuser Since: 2023.01.2 USER.AUTHENTICATION.AUTH_VIA_AD_AGENT Legacy event types: app.ad.agent.user_auth, app.ad.agent.user_auth.error, app.ad.login.bad_password, app.ad.login.expired_password, app.ad.login.locked_account, app.ad.login.success, app.ad.login.unknown_failure, app.ad.outbound.delauth.no_connected_agent, app.ad.outbound.delauth.timeout Authenticate user with AD agent. directoryuser Since: 2016.18 USER.AUTHENTICATION.AUTH_VIA_IDP Legacy event types: core.user_auth.idp.cannot_update_user_profile_or_groups, core.user_auth.idp.cannot_update_user_profile_or_groups.server_read_only, core.user_auth.idp.general_schema_warning, core.user_auth.idp.invalid_user_status, core.user_auth.idp.link_denied_for_groups, core.user_auth.idp.login_failed, core.user_auth.idp.multiple_matching_users, core.user_auth.idp.no_matching_users, core.user_auth.idp.saml.assertion_received_same_assertion_id, core.user_auth.idp.saml.login_success, core.user_auth.idp.saml.response_received_in_response_to_no_matching_key, core.user_auth.idp.saml.saml_validation_failed, core.user_auth.idp.saml.unknown_endpoint, core.user_auth.idp.saml.unknown_profile_attribute, core.user_auth.idp.username_filtered, core.user_auth.idp.username_transform_failed, core.user_auth.idp.x509.login_success Authenticate user via IDP. user Since: 2016.18 USER.AUTHENTICATION.AUTH_VIA_LDAP_AGENT Legacy event types: app.ldap.login.bad_password, app.ldap.login.disabled_account, app.ldap.login.expired_password, app.ldap.login.locked_account, app.ldap.login.success, app.ldap.login.unknown_failure, app.ldap.outbound.delauth.no_connected_agent, app.ldap.outbound.delauth.timeout Authenticate user via LDAP agent. directoryuser Since: 2016.18 USER.AUTHENTICATION.AUTH_VIA_INBOUND_SAML Legacy event types: core.user_auth.saml2.inbound_saml_login_failed Authenticate user via inbound SAML. user Since: 2016.27 USER.AUTHENTICATION.AUTH_VIA_INBOUND_DELAUTH Legacy event types: app.inbound_del_auth.failure.account_not_found, app.inbound_del_auth.failure.duplicate_accounts_found, app.inbound_del_auth.failure.instance_not_found, app.inbound_del_auth.failure.invalid_login_credentials, app.inbound_del_auth.failure.invalid_request.could_not_parse_credentials, app.inbound_del_auth.failure.not_supported Authenticate user via inbound delauth. user Since: 2016.02 USER.AUTHENTICATION.AUTH_VIA_IWA Legacy event types: iwa.auth, iwa.invalid_certificate, iwa.invalid_token, iwa.invalid_xml_signature, iwa.no_certificate Authenticate user via IWA. user Since: 2016.02 USER.AUTHENTICATION.AUTH_VIA_MFA Legacy event types: core.user.factor.attempt_fail, core.user.factor.attempt_success, core.user_auth.duo.disabled_lockout, core.user_auth.duo.duo_down, core.user_auth.duo.invalid_integration Authentication of user via MFA. For Okta Classic orgs, this event will only fire for second factor verifications, whereas for Identity Engine orgs, this event will fire for both primary and second factor verifications. event-hook-eligiblemfa Since: 2016.02 USER.AUTHENTICATION.AUTH_VIA_RADIUS Legacy event types: core.user_auth.radius.login.failed, core.user_auth.radius.login.succeeded Authentication of user via Radius. appradius Since: 2016.18 USER.AUTHENTICATION.AUTH_VIA_RICHCLIENT Legacy event types: app.rich_client.account_not_found, app.rich_client.instance_not_found, app.rich_client.login_failure, app.rich_client.login_success, app.rich_client.multiple_accounts_found Authentication of a user via Rich Client. user Since: 2016.18 USER.AUTHENTICATION.AUTH_VIA_SOCIAL Legacy event types: core.user_auth.idp.social.cannot_acquire_access_token, core.user_auth.idp.social.cannot_acquire_profile, core.user_auth.idp.social.invalid_userinfo_response, core.user_auth.idp.social.jit_callout_denied_by_callout, core.user_auth.idp.social.jit_callout_redirect, core.user_auth.idp.social.jit_callout_response_invalid, core.user_auth.idp.social.jit_callout_success, core.user_auth.idp.social.jit_error, core.user_auth.idp.social.link_callout_denied_by_callout, core.user_auth.idp.social.link_callout_redirect, core.user_auth.idp.social.link_callout_response_invalid, core.user_auth.idp.social.link_callout_success, core.user_auth.idp.social.link_denied_for_groups, core.user_auth.idp.social.login_success Authenticate user with social login. user Since: 2016.18 USER.AUTHENTICATION.AUTHENTICATE Legacy event types: core.user_auth.authentication.auth_via_3rd_party_failure, core.user_auth.authentication.auth_via_3rd_party_success, core.user_auth.authentication.auth_via_okta_mobile_failure, core.user_auth.authentication.auth_via_okta_mobile_success, core.user_auth.authentication.auth_via_omm_failure, core.user_auth.authentication.auth_via_omm_success, core.user_auth.authentication.auth_via_saml_idp_failure, core.user_auth.authentication.auth_via_saml_idp_success, core.user_auth.authentication.authenticate Authentication via device trust certificate. device-trust-authenticationevent-hook-eligibleuser Since: 2017.44 USER.AUTHENTICATION.SLO Legacy event types: app.auth.slo, app.auth.slo.saml.invalid_issuer, app.auth.slo.saml.invalid_nameid, app.auth.slo.saml.invalid_signature, app.auth.slo.saml.malformed_request, app.auth.slo.saml.malformed_request.invalid_type, app.auth.slo.with_reason User single logout out (SLO) from app. user Since: 2016.11 USER.AUTHENTICATION.SSO Legacy event types: app.auth.sso Fired when a user performs a single sign-on (SSO) to an app instance and contains the client details of the user. Can be used to identify when a user attempted to sign into an application for audit or debugging purposes. Note that the event is fired even when the sign-on is unsuccessful. event-hook-eligibleuser Since: 2016.11 USER.AUTHENTICATION.VERIFY Legacy event types: user.authentication.verify Verify user identity. end-user-visibleuser Since: 2017.27 USER.CREDENTIAL.ENROLL Legacy event types: core.user_auth.credential.enroll Device Trust certificate enrollment. device-trust-cert-distribution-and-bindingevent-hook-eligibleuser Since: 2017.45 USER.IDENTITY_SNAPSHOT.ATTESTATION.CREATE Create identity snapshot attestation for a user. This event can be used by administrators to audit identity snapshot attestations minted for a user. The user and the application are in the event, signifying which user the attestation token is being minted for, and which application is requesting it. attestationuser Since: 2020.09.3 USER.IMPORT.PASSWORD Fired when a user has successfully logged in to Okta and an attempt to import their Password has been made. This can be used to understand if a user password import attempt was successful or if it failed. If the attempt failed, the password import will be tried again on a subsequent successful login. When fired, this event contains information about the import type, and whether or not the password import was successful. If the import is successful, it is safe to "clean up" that user from an external system. If the import failed, Okta will continue retrying the import during every successful authentication attempt until the password is successfully imported. Check the failure reason for details about whether any action is needed for the import to succeed. credentialevent-hook-eligibleimportuser Since: 2020.05.1 USER.LIFECYCLE.ACTIVATE Legacy event types: core.user.config.user_activated Activate Okta user. event-hook-eligibleuser Since: 2016.13 USER.LIFECYCLE.CREATE Legacy event types: core.user.config.user_creation.failure, core.user.config.user_creation.success Create Okta user. event-hook-eligibleuser Since: 2016.02 USER.LIFECYCLE.DEACTIVATE Legacy event types: core.user.config.user_deactivated Deactivate Okta user. event-hook-eligibleuser Since: 2016.02 USER.LIFECYCLE.DELETE.COMPLETED Legacy event types: core.user.config.user_status.delete.completed Delete Okta user completed. user Since: 2016.29 USER.LIFECYCLE.DELETE.INITIATED Legacy event types: core.user.config.user_status.delete.initiated Delete Okta user initiated. event-hook-eligibleuser Since: 2016.29 USER.LIFECYCLE.JIT.ERROR.READ_ONLY Legacy event types: core.user.jit.error.read_only Failed to JIT create user. user Since: 2018.06 USER.LIFECYCLE.PASSWORD_MASS_EXPIRY Legacy event types: core.user.config.user_status.password_mass_expiry Mass expire all users' passwords initiated. user Since: 2018.04 USER.LIFECYCLE.REACTIVATE Legacy event types: core.user.config.user_reactivation.success Reactivate Okta user. event-hook-eligibleuser Since: 2016.13 USER.LIFECYCLE.SUSPEND Legacy event types: core.user.config.user_status.suspended Suspend Okta user. event-hook-eligibleuser Since: 2016.13 USER.LIFECYCLE.UNSUSPEND Legacy event types: core.user.config.user_status.unsuspended Unsuspend Okta user. event-hook-eligibleuser Since: 2016.13 USER.MFA.ATTEMPT_BYPASS Legacy event types: core.user_auth.mfa_bypass_attempted Attempt bypass of factor. mfa Since: 2016.11 USER.MFA.FACTOR.ACTIVATE Legacy event types: core.user.factor.activate Activate factor or authenticator enrollment method for user. Provides org admins with audit log and oversight utility for an MFA factor when it is activated. When fired, the event contains information about the MFA factor that has been activated, as well as the target user and the user activating the factor. For Identity Engine orgs, this event will fire when an authentication method is enrolled. end-user-visibleevent-hook-eligiblemfa Since: 2016.11 USER.MFA.FACTOR.DEACTIVATE Legacy event types: core.user.factor.deactivate Reset factor or authenticator enrollment method for user. Provides org admins with audit log and oversight utility for the change in MFA factor lifecycle status when a specific factor is permanently deactivated. When fired, the event contains information about the MFA factor that has been deactivated, as well as the target user and the user deactivating the factor. For Identity Engine orgs, this event will fire when an authentication method is unenrolled. end-user-visibleevent-hook-eligiblemfa Since: 2016.11 USER.MFA.FACTOR.RESET_ALL Legacy event types: core.user.factor.reset_all Reset all factors or authenticator enrollments for user. Provides org admins with audit log and oversight utility for the change in MFA factor lifecycle statuses when all MFA factors for a user are permanently deactivated. When fired, the event contains information about the target user for whom all factors have been deactivated, as well as the user resetting the factors. For Identity Engine orgs, this event contains information about a target user for whom all authenticator enrollments have been reset. event-hook-eligiblemfa Since: 2016.11 USER.MFA.FACTOR.SUSPEND Suspend factor or authenticator enrollment method for user. Provides org admins with audit log and oversight utility for the change in MFA factor lifecycle status when a factor is suspended, usually as a result of suspected compromise. When fired, the event contains information about the MFA factor that has been suspended, as well as the target user and the user suspending the factor. When unsuspended, related event user.mfa.factor.unsuspend will be fired. event-hook-eligiblemfaoie-only Since: 2020.09.4 USER.MFA.FACTOR.UNSUSPEND Unsuspend factor or authenticator enrollment method for user. Provides org admins with audit log and oversight utility for the change in MFA factor lifecycle status when a factor is reactivated from a state of suspension, after it has been determined that the authenticator is secure. When fired, the event contains information about the MFA factor that has been unsuspended, as well as the target user and the user reactivating the suspended factor. Before suspension, related event user.mfa.factor.suspend would have been fired. event-hook-eligiblemfaoie-only Since: 2020.09.4 USER.MFA.FACTOR.UPDATE Legacy event types: core.user.factor.update Update factor for user. event-hook-eligiblemfa Since: 2016.11 USER.MFA.OKTA_VERIFY Legacy event types: core.user_auth.mfa_okta_verify_response Verify user with Okta verify. mfa Since: 2016.11 USER.MFA.OKTA_VERIFY.DENY_PUSH Legacy event types: core.user.factor.push_rejected User rejected Okta push verify. This event is triggered in classic V1 API calls. In OIE we use a generic event for factor verification failure: user.authentication.auth_via_mfa with reason INVALID_CREDENTIALS. mfa Since: 2018.03 USER.MFA.OKTA_VERIFY.DENY_PUSH_UPGRADE_NEEDED Legacy event types: core.user.factor.push_rejected.upgrade_needed Rejected Okta push verify as Upgrade Needed. This can be used to audit events where Okta push verify was rejected as the app needed upgrade. Note that the event is fired when Okta Verify push is rejected. It is possible that the user might have chosen another factor and made successful login as well. mfa Since: 2020.05.0 USER.SESSION.ACCESS_ADMIN_APP Legacy event types: app.admin.sso.bad_response, app.admin.sso.login.success, app.admin.sso.no_response User accessing Okta admin app. adminappsessionuser Since: 2016.14 USER.SESSION.CLEAR Legacy event types: core.user_auth.session_clear Clear user session. event-hook-eligiblesessionuser Since: 2016.15 USER.SESSION.END Legacy event types: core.user_auth.logout_success User logout from Okta. event-hook-eligiblesessionuser Since: 2016.02 USER.SESSION.EXPIRE Legacy event types: core.user_auth.session_expired Expire user session. sessionuser Since: 2016.15 USER.SESSION.IMPERSONATION.END Legacy event types: core.user.impersonation.session.ended End impersonation session. sessionuser Since: 2016.09 USER.SESSION.IMPERSONATION.EXTEND Legacy event types: core.user.impersonation.grant.extended Extend impersonation session. sessionuser Since: 2016.09 USER.SESSION.IMPERSONATION.GRANT Legacy event types: core.user.impersonation.grant.enabled Enable impersonation grant. sessionuser Since: 2016.09 USER.SESSION.IMPERSONATION.INITIATE Legacy event types: core.user.impersonation.session.initiated Initiate impersonation session. sessionuser Since: 2016.09 USER.SESSION.IMPERSONATION.REVOKE Legacy event types: core.user.impersonation.grant.revoked Revoke impersonation grant. sessionuser Since: 2016.09 USER.SESSION.START Legacy event types: core.user_auth.invalid_certificate, core.user_auth.login_denied, core.user_auth.login_failed, core.user_auth.login_failed.policy_denied, core.user_auth.login_success, core.user_auth.session_created_using_api_token, core.user_auth.session_created_using_token User login to Okta. end-user-visibleevent-hook-eligiblesessionuser Since: 2016.02 WORKFLOWS.USER.CONNECTION.CREATE This event can be used by any admin or security team member to monitor the creation of new connections for Workflows connectors. The target fields provide information on the user that created the connection, the application for which the connection was created, and the display name the user provided for the connection. Other connection lifecycle events include: workflows.user.connection.revoke, workflows.user.connection.reauthorize, and workflows.user.connection.delete. Note that this event only indicates if a connection was successfully added to the database, and does not distinguish whether or not that connection is valid. workflows Since: 2021.02.1 WORKFLOWS.USER.CONNECTION.DELETE This event can be used by any admin or security team member to monitor the deletion of existing Workflows connections. The target fields provide information on the user that deleted the connection, the application for which the connection was deleted, and the display name originally provided for the connection. Other connection lifecycle events include: workflows.user.connection.create, workflows.user.connection.reauthorize, and workflows.user.connection.revoke. Note that for OAuth connections this will often fire with the workflows.user.connection.revoke event. workflows Since: 2021.02.1 WORKFLOWS.USER.CONNECTION.REAUTHORIZE This event can be used by any admin or security team member to monitor the reauthorization of existing connections for Workflows connectors. Reauthorization can be used to retrieve a new access token or to change the credentials used by a connection. The target fields provide information on the user that reauthorized the connection, the application for which the connection was reauthorized, and the display name originally provided for the connection. Other connection lifecycle events include: workflows.user.connection.create, workflows.user.connection.revoke, and workflows.user.connection.delete. Note that this event only indicates if a user attempted to reauthorize a connection, and does not distinguish whether or not that reauthorization was successful. workflows Since: 2021.02.1 WORKFLOWS.USER.CONNECTION.REVOKE This event can be used by any admin or security team member to monitor when a token for a Workflows connection has been revoked in a third party service., and the event usually fires along with workflows.user.connection.delete. The target fields provide information on the user that revoked the connection, the application for which the connection was revoked, and the display name originally provided for the connection. Other connection lifecycle events include: workflows.user.connection.create, workflows.user.connection.reauthorize, and workflows.user.connection.delete. Note that this event only fires for connections where the service supplies an API endpoint for revoking tokens. Tokens that cannot be revoked via API must be managed manually in the third party application. workflows Since: 2021.02.1 WORKFLOWS.USER.DELEGATEDFLOW.RUN This event can be used by admins or security team members to monitor the execution of delegated flows in the Workflows platform from the Admin application. The actor field provides the Okta User ID of the user that ran the flow. The target fields provide context on the Workflows instance as well as the name and flow id of the executed flow. This event only indicates if the flow was successfully triggered and does not provide information about whether the flow encountered an error. workflows Since: 2022.06.0 WORKFLOWS.USER.FLOW.ACTIVATE Triggered when a user activates a flow in Workflows. Can be used to audit user activity in Workflows. Event is fired when a user toggles a flow on. workflows Since: 2021.02.1 WORKFLOWS.USER.FLOW.CREATE Triggered when a user creates a new flow in Workflows. Can be used to audit user activity in Workflows. Event is fired when a user creates and saves a new flow. workflows Since: 2021.02.1 WORKFLOWS.USER.FLOW.DEACTIVATE Triggered when a user deactivates a flow in Workflows. Can be used to audit user activity in Workflows. This is triggered by deactivating a flow. workflows Since: 2021.02.1 WORKFLOWS.USER.FLOW.DELETE Triggered when a user deletes a flow in Workflows. Can be used to audit user activity in Workflows. Event is fired when a user toggles a flow off. workflows Since: 2021.02.1 WORKFLOWS.USER.FLOW.EXPORT Triggered when a user exports a flow from Workflows. Can be used to audit user activity in Workflows. Event is fired when a user exports one or more flows as a flowpack. workflows Since: 2021.02.1 WORKFLOWS.USER.FLOW.IMPORT Triggered when a user imports a flow into Workflows. Can be used to audit user activity in Workflows. Event is fired when a user imports one or more flows as a flowpack. workflows Since: 2021.02.1 WORKFLOWS.USER.FLOW.SAVE Triggered when a user saves a flow in Workflows. Can be used to audit user activity in Workflows. Event is fired when a user saves a flow. workflows Since: 2021.02.1 WORKFLOWS.USER.FOLDER.CREATE This event can be used by any admin or security team member to monitor the creation of new folders in the Workflows platform. The payload provides information about the user that created the folder and the folder that was created. Other folder lifecycle events include: workflows.user.folder.delete, workflows.user.folder.import, workflows.user.folder.export, and workflows.user.folder.rename. Note that this event doesn't fire when a folder is imported. For that, users can reference workflows.user.folder.import. workflows Since: 2023.06.1 WORKFLOWS.USER.FOLDER.DELETE This event can be used by any admin or security team member to monitor the deletion of folders in the Workflows platform. The payload provides information on the user that deleted the folder and which folder was deleted. Other folder lifecycle events include: workflows.user.folder.create, workflows.user.folder.import, workflows.user.folder.export, and workflows.user.folder.rename. Note that this event fires when a user manually deletes a folder and recursively for each subfolder contained within the deleted folder. Subsequent workflows.user.flow.delete and workflows.user.table.delete events will fire for each flow and table deleted within each folder. workflows Since: 2022.11.1 WORKFLOWS.USER.FOLDER.EXPORT This event can be used by any admin or security team member to monitor when a user exports a folder from the Workflows platform. The payload provides information on the user that exported the folder and the folder that was exported. Other folder lifecycle events include: workflows.user.folder.create, workflows.user.folder.delete, workflows.user.folder.import, and workflows.user.folder.rename. Note that this event fires for the exported folder and recursively for each subfolder contained within the exported folder depending on the user's selection. Subsequent workflows.user.flow.export and workflows.user.table.schema.export events will fire for each flow and table exported within each exported folder. Additional folder information can be found in the debug context field. workflows Since: 2023.06.1 WORKFLOWS.USER.FOLDER.IMPORT This event can be used by any admin or security team member to monitor when a user imports a folder to the Workflows platform. The payload provides information on the user that imported the folder and the folder that was imported. Other folder lifecycle events include: workflows.user.folder.create, workflows.user.folder.delete, workflows.user.folder.export, and workflows.user.folder.rename. Note that this event fires for the imported folder and recursively for each subfolder contained within the imported folder. Subsequent workflows.user.flow.import and workflows.user.table.schema.import events will fire for each flow and table imported within each imported folder. Additional folder information can be found in the debug context field. workflows Since: 2023.06.1 WORKFLOWS.USER.FOLDER.RENAME This event can be used by any admin or security team member to monitor when a user renames a folder in the Workflows platform. The payload provides information on the user that renamed the folder and the new name of the folder. Other folder lifecycle events include: workflows.user.folder.create, workflows.user.folder.delete, workflows.user.folder.import, and workflows.user.folder.export. Additional information including old and new folder names can be found in the debug context field. workflows Since: 2023.06.1 WORKFLOWS.USER.TABLE.CREATE This event can be used by any admin or security team member to monitor the creation of new tables in the Workflows platform. The target fields provide information on the user that created the table and the new table. Other table lifecycle events include: workflows.user.table.view, workflows.user.table.update, and workflows.user.table.delete. Note that this event doesn't fire when a table is imported. For that, users can reference workflows.user.table.import or workflows.user.folder.import. workflows Since: 2021.02.1 WORKFLOWS.USER.TABLE.DELETE This event can be used by any admin or security team member to monitor when a user deletes a table from the Workflows platform. The target fields provide information on the user that deleted the table and the table itself. Other table lifecycle events include: workflows.user.table.view, workflows.user.table.update, and workflows.user.table.create. workflows Since: 2021.02.1 WORKFLOWS.USER.TABLE.EXPORT This event can be used by any admin or security team member to monitor when a user exports table data from the Workflows platform using the Tables interface. The target fields provide information on the user that exported the table and the table itself. Related events include: workflows.user.table.import, workflows.user.folder.import, and workflows.user.folder.export. Note that exports through the table interface include table data, while exporting tables as part of folder export does not. workflows Since: 2021.02.1 WORKFLOWS.USER.TABLE.IMPORT This event can be used by any admin or security team member to monitor when a user imports table data into the Workflows platform using the Tables interface. The target fields provide information on the user that imported the table and the table itself. Related events include: workflows.user.table.export, workflows.user.folder.export, and workflows.user.folder.import. Note that importing through the table interface requires an existing schema and is used to import the data from a .csv file. This event does not fire as part of workflows.user.folder.import. workflows Since: 2021.02.1 WORKFLOWS.USER.TABLE.SCHEMA.EXPORT This event can be used by any admin or security team member to monitor when a user exported a table schema from the Workflows platform. The payload provides information on the user that exported the table schema and the table that was exported. Other related table events include: workflows.user.table.create, workflows.user.table.delete, workflows.user.table.update, workflows.user.table.view, workflows.user.table.import, workflows.user.table.export, and workflows.user.table.schema.import. This event fires when a user exports a folder that contains a table. workflows Since: 2023.06.1 WORKFLOWS.USER.TABLE.SCHEMA.IMPORT This event can be used by any admin or security team member to monitor when a user has imported a table schema into the Workflows platform. The payload provides information on the user that imported the schema and the table that was created from that schema. Other related table events include: workflows.user.table.create, workflows.user.table.delete, workflows.user.table.update, workflows.user.table.view, workflows.user.table.import, workflows.user.table.export, and workflows.user.table.schema.export. This event fires when a user imports a folder that contains a table. workflows Since: 2023.06.1 WORKFLOWS.USER.TABLE.UPDATE This event can be used by any admin or security team member to monitor when a user updates a table's schema on the Workflows platform. The target fields provide information on the user that updated the table and the table itself. Other table lifecycle events include workflows.user.table.view, workflows.user.table.create, and workflows.user.table.delete. Note that this event does not include information about what was updated, only that the table name or columns were modified. It does not fire when the table data itself is updated. workflows Since: 2021.02.1 WORKFLOWS.USER.TABLE.VIEW This event can be used by any admin or security team member to monitor the viewing of table data in the Workflows platform. The target fields provide information on the user that viewed the table and which table was viewed. Other table lifecycle events include: workflows.user.table.create, workflows.user.table.update, and workflows.user.table.delete. Note that this event only fires when a user manually accesses a table. It does not fire when table data is accessed using the Workflows Table functions. workflows Since: 2021.02.1 ZONE.ACTIVATE Legacy event types: zone.activate Network zone activate. network-zone Since: 2017.49 ZONE.CREATE Legacy event types: zone.create Network zone create. network-zone Since: 2017.49 ZONE.DEACTIVATE Legacy event types: zone.deactivate Network zone deactivate. network-zone Since: 2017.49 ZONE.DELETE Legacy event types: zone.delete Network zone delete. network-zone Since: 2017.49 ZONE.MAKE_BLACKLIST Legacy event types: zone.make_blacklist Network zone mark as blacklist. network-zone Since: 2017.49 ZONE.REMOVE_BLACKLIST Legacy event types: zone.remove_blacklist Network zone unmark as blacklist. network-zone Since: 2017.49 ZONE.UPDATE Legacy event types: zone.update Network zone update. network-zone Since: 2017.49 Edit This Page On GitHub On this page * Catalog ADDITIONAL LINKS Questions? Ask us on the forum. * * * * CONTACT & LEGAL * Contact our team * Contact sales * Developer Service terms * Site terms * Privacy policy * Copyright & trademarks MORE INFORMATION * Integrate with Okta * Pricing * 3rd-party notes * Customer Identity Cloud OKTA.COM Products, case studies, resources HELP CENTER Knowledgebase, roadmaps, and more TRUST System status, security, compliance Copyright © 2023 Okta. All rights reserved. Feedback We use cookies to ensure you get the best experience on our website, to help us understand our marketing efforts, and to reach potential customers across the web. You can learn more by viewing our privacy policy. Cookies Settings Reject All Cookies Accept All Cookies PRIVACY PREFERENCE CENTER YOUR PRIVACY YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information * STRICTLY NECESSARY COOKIES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. * PERFORMANCE COOKIES PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. * FUNCTIONAL COOKIES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. * TARGETING COOKIES TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All Clear Filters Information storage and access Apply Confirm My Choices Allow All Cookies