Skip to content

Commit 3da47e6

Browse files
content-botxsoar-botostolerocapanwjohnnywilkes
committed
[Marketplace Contribution] Okta - Content Pack Update (demisto#29650)
* [Marketplace Contribution] Okta - Content Pack Update (demisto#29303) * "contribution update to pack "Okta"" * minor fixes * add outputs and readme * add outputs description * update docker * change outputs --------- Co-authored-by: ostolero <[email protected]> Co-authored-by: ostolero <[email protected]> * Fixing AWS Project Number in ASM Cloud (demisto#29593) (demisto#29642) Co-authored-by: Chait A <[email protected]> Co-authored-by: johnnywilkes <[email protected]> Co-authored-by: Michael Yochpaz <[email protected]> * [MS Teams] support reset_graph_auth (demisto#29644) * fixed * pre-commit * update * Recordedfuture threathunting v2.5.0 (demisto#29641) * Recordedfuture threathunting v2.5.0 (demisto#29025) * Add commands related to Automated Threat hunting recordedfuture-threat-map recordedfuture-threat-links recordedfuture-detection-rules * Add recordedfuture-collective-insight command. Change app version. * Update README.md. Add release notes * Add playbook. Add unittests * Add unittests * Fix test_collective_insight_command * Remove incorrect release note * Add documentation for threat actor search playbook * update Recorded Future Threat actor search playbook. add release note about new playbook. * Update release notes, fix formatting * Format yml files * Update Recorded future threat actor search playbook * Update docker image * Fix linter --------- Co-authored-by: Michael Yochpaz <[email protected]> * Minor README fixes --------- Co-authored-by: Yaroslav Nestor <[email protected]> Co-authored-by: Michael Yochpaz <[email protected]> * [ASM] Expander 5777 (demisto#29647) * [ASM] Expander 5777 (demisto#29619) * first * RN * Bump pack from version CortexAttackSurfaceManagement to 1.6.36. --------- Co-authored-by: johnnywilkes <[email protected]> Co-authored-by: Content Bot <[email protected]> * XDR Malware Enrichment - hotfix for usernames (split) (demisto#29585) * Updated playbook with hotfix where we split usernames from domains and append them to the username list of usernames for account enrichment * Added RN * remove irrelevant test * Updated RN * Bump pack from version CortexXDR to 5.1.6. * Update Packs/CortexXDR/ReleaseNotes/5_1_6.md Co-authored-by: ShirleyDenkberg <[email protected]> --------- Co-authored-by: Content Bot <[email protected]> Co-authored-by: ShirleyDenkberg <[email protected]> * Update Docker Image To demisto/pyjwt3 (demisto#29656) * Updated Metadata Of Pack Silverfort * Added release notes to pack Silverfort * Packs/Silverfort/Integrations/Silverfort/Silverfort.yml Docker image update * Update Docker Image To demisto/trustar (demisto#29660) * Updated Metadata Of Pack TruSTAR * Added release notes to pack TruSTAR * Update Docker Image To demisto/keeper-ksm (demisto#29661) * Updated Metadata Of Pack KeeperSecretsManager * Added release notes to pack KeeperSecretsManager * Packs/KeeperSecretsManager/Integrations/KeeperSecretsManager/KeeperSecretsManager.yml Docker image update * Update Docker Image To demisto/py3-tools (demisto#29654) * Updated Metadata Of Pack Intezer * Added release notes to pack Intezer * Packs/Intezer/Integrations/IntezerV2/IntezerV2.yml Docker image update * Updated Metadata Of Pack FeedMalwareBazaar * Added release notes to pack FeedMalwareBazaar * Packs/FeedMalwareBazaar/Integrations/MalwareBazaarFeed/MalwareBazaarFeed.yml Docker image update * Updated Metadata Of Pack FeedGCPWhitelist * Added release notes to pack FeedGCPWhitelist * Packs/FeedGCPWhitelist/Integrations/FeedGoogleIPRanges/FeedGoogleIPRanges.yml Docker image update * Updated Metadata Of Pack AccentureCTI_Feed * Added release notes to pack AccentureCTI_Feed * Packs/AccentureCTI_Feed/Integrations/ACTIIndicatorFeed/ACTIIndicatorFeed.yml Docker image update * Fix DS108 --------- Co-authored-by: sberman <[email protected]> * Update Docker Image To demisto/taxii-server (demisto#29659) * Updated Metadata Of Pack CybleThreatIntel * Added release notes to pack CybleThreatIntel * Packs/CybleThreatIntel/Integrations/CybleThreatIntel/CybleThreatIntel.yml Docker image update * Fix DS108 --------- Co-authored-by: sberman <[email protected]> * Update Docker Image To demisto/datadog-api-client (demisto#29662) * Updated Metadata Of Pack DatadogCloudSIEM * Added release notes to pack DatadogCloudSIEM * Packs/DatadogCloudSIEM/Integrations/DatadogCloudSIEM/DatadogCloudSIEM.yml Docker image update * Fix DS108 --------- Co-authored-by: sberman <[email protected]> * Add reliability parameter to cves and pipl integration (demisto#28703) * commiting PrismaCloudCompute * release notes added * changed couldcompute, CVESearchV2, pipl * added pack metadata * fixed pipl readme * reverting changes in CVESearch since it was deprecated * removed redundant * committing pre commit changes * added known words * added known words * fixed lint error * changed according to review * updated docker version in PrismaCloudCompute * changed according to doc review * Added condition for not receiving new incidents in the test playbook * updating release notes * reverting fetch changes * fixed playbook * formatted playbook * new validation, new run * new validation, new run * Bump pack from version PrismaCloudCompute to 1.4.10. * update the docker image --------- Co-authored-by: Content Bot <[email protected]> * Proofpoint email security pack: update description (demisto#29651) * update description * Updated the schema file. * Updated the schema file. --------- Co-authored-by: Yehonatan Asta <[email protected]> * Jira v2 deprecated (demisto#29649) * Deprecate to jira v2 * update RN * update conf.json file * add task to the Create Jira Issue playbook that check if jira v3 is enable * add image.png of the playbook * update the playbook (yml, readme, image) and RN * Update Docker Image To demisto/python3 (demisto#29652) * Updated Metadata Of Pack PANOSPolicyOptimizer * Added release notes to pack PANOSPolicyOptimizer * Packs/PANOSPolicyOptimizer/Integrations/PANOSPolicyOptimizer/PANOSPolicyOptimizer.yml Docker image update * Updated Metadata Of Pack VMwareWorkspaceONEUEM * Added release notes to pack VMwareWorkspaceONEUEM * Packs/VMwareWorkspaceONEUEM/Integrations/VMwareWorkspaceONEUEM/VMwareWorkspaceONEUEM.yml Docker image update * Updated Metadata Of Pack CiscoSMA * Added release notes to pack CiscoSMA * Packs/CiscoSMA/Integrations/CiscoSMA/CiscoSMA.yml Docker image update * Updated Metadata Of Pack FeedThreatConnect * Added release notes to pack FeedThreatConnect * Packs/FeedThreatConnect/Integrations/FeedThreatConnect/FeedThreatConnect.yml Docker image update * Updated Metadata Of Pack BitSight * Added release notes to pack BitSight * Packs/BitSight/Integrations/BitSightForSecurityPerformanceManagement/BitSightForSecurityPerformanceManagement.yml Docker image update * Updated Metadata Of Pack AWS-ILM * Added release notes to pack AWS-ILM * Packs/AWS-ILM/Integrations/AWSILM/AWSILM.yml Docker image update * Updated Metadata Of Pack CiscoWSA * Added release notes to pack CiscoWSA * Packs/CiscoWSA/Integrations/CiscoWSAV2/CiscoWSAV2.yml Docker image update * Updated Metadata Of Pack SysAid * Added release notes to pack SysAid * Packs/SysAid/Integrations/SysAid/SysAid.yml Docker image update * Updated Metadata Of Pack ManageEngine_PAM360 * Added release notes to pack ManageEngine_PAM360 * Packs/ManageEngine_PAM360/Integrations/ManageEnginePAM360/ManageEnginePAM360.yml Docker image update * Updated Metadata Of Pack CiscoUmbrellaReporting * Added release notes to pack CiscoUmbrellaReporting * Packs/CiscoUmbrellaReporting/Integrations/CiscoUmbrellaReporting/CiscoUmbrellaReporting.yml Docker image update * Fix DS108 --------- Co-authored-by: sberman <[email protected]> * XSUP-27717/FortiSIEM (demisto#29458) * add tests * add RN,fix,logs * Update 2_0_21.md * add period * add a name to incident * fixes CR * update docker image * delete logs * CR fixes * Update 2_0_21.md * Update FortiSIEMV2.py * reverting the Docker image (demisto#29607) * reverting the Docker image * Update Packs/cyberark_AIM/ReleaseNotes/1_0_14.md --------- Co-authored-by: Dan Tavori <[email protected]> * [Marketplace Contribution] Roksit DNS Security Integration - Sarp (demisto#29663) * [Marketplace Contribution] Roksit DNS Security Integration - Sarp (demisto#29314) * "pack contribution initial commit" * Update RoksitDNSSecurityIntegrationSarp.py * Update RoksitDNSSecurityIntegrationSarp.py * Yehuda's version * test module * readme * new logo * Update RoksitDNSSecurityIntegrationSarp.yml * Apply suggestions from code review * Update RoksitDNSSecurityIntegrationSarp_description.md * Update pack_metadata.json * Update README.md * Update pack_metadata.json * Update pack_metadata.json * Update Packs/RoksitDNSSecurityIntegration-Sarp/pack_metadata.json * fixes * change name * folder name * file names * version * rename sub folder * remove (DNSSense) from the integration name * rename folder * docker * replace image * fix image name --------- Co-authored-by: asimsarpkurt <[email protected]> Co-authored-by: Yehuda <[email protected]> Co-authored-by: Yehuda Rosenberg <[email protected]> * rename image --------- Co-authored-by: xsoar-bot <[email protected]> Co-authored-by: asimsarpkurt <[email protected]> Co-authored-by: Yehuda <[email protected]> Co-authored-by: Yehuda Rosenberg <[email protected]> * add unstuck fetch stream command (demisto#29646) * add unstuck fetch stream command * added RN * fixes * add note * cr fixes * fix conflicts * reverts * [pre-commit pycln] Align the entire repo with pycln demisto#4 (demisto#29665) * Fix pycln errors * Update the docker images * Run demisto-sdk pre-commit * update docker --------- Co-authored-by: xsoar-bot <[email protected]> Co-authored-by: ostolero <[email protected]> Co-authored-by: ostolero <[email protected]> Co-authored-by: Chait A <[email protected]> Co-authored-by: johnnywilkes <[email protected]> Co-authored-by: Michael Yochpaz <[email protected]> Co-authored-by: michal-dagan <[email protected]> Co-authored-by: Yaroslav Nestor <[email protected]> Co-authored-by: Content Bot <[email protected]> Co-authored-by: Ido van Dijk <[email protected]> Co-authored-by: ShirleyDenkberg <[email protected]> Co-authored-by: sberman <[email protected]> Co-authored-by: DinaMeylakh <[email protected]> Co-authored-by: ilaner <[email protected]> Co-authored-by: Yehonatan Asta <[email protected]> Co-authored-by: israelpoli <[email protected]> Co-authored-by: sapir shuker <[email protected]> Co-authored-by: Mai Morag <[email protected]> Co-authored-by: Dan Tavori <[email protected]> Co-authored-by: asimsarpkurt <[email protected]> Co-authored-by: Yehuda <[email protected]> Co-authored-by: Yehuda Rosenberg <[email protected]> Co-authored-by: Yuval Hayun <[email protected]> Co-authored-by: Menachem Weinfeld <[email protected]>
1 parent 08cefee commit 3da47e6

File tree

7 files changed

+170
-31
lines changed

7 files changed

+170
-31
lines changed

Packs/Okta/Integrations/Okta_v2/Okta_v2.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,13 @@ def set_temp_password(self, user_id):
173173
url_suffix=uri,
174174
)
175175

176+
def expire_password(self, user_id):
177+
uri = f'users/{user_id}/lifecycle/expire_password'
178+
return self._http_request(
179+
method="POST",
180+
url_suffix=uri
181+
)
182+
176183
def add_user_to_group(self, user_id, group_id):
177184
uri = f'groups/{group_id}/users/{user_id}'
178185
return self._http_request(
@@ -804,6 +811,30 @@ def set_password_command(client, args):
804811
)
805812

806813

814+
def expire_password_command(client, args):
815+
user_id = client.get_user_id(args.get('username'))
816+
817+
if not (args.get('username') or user_id):
818+
raise Exception("You must supply either 'Username' or 'userId")
819+
820+
raw_response = client.expire_password(user_id)
821+
user_context = client.get_users_context(raw_response)
822+
823+
if argToBoolean(args.get('temporary_password', True)):
824+
client.set_temp_password(user_id)
825+
826+
readable_output = tableToMarkdown('Okta Expired Password', raw_response, removeNull=True)
827+
outputs = {
828+
'Account(val.ID && val.ID === obj.ID)': createContext(user_context, removeNull=True)
829+
}
830+
831+
return (
832+
readable_output,
833+
outputs,
834+
raw_response
835+
)
836+
837+
807838
def add_user_to_group_command(client, args):
808839
group_id = args.get('groupId')
809840
user_id = args.get('userId')
@@ -1353,6 +1384,7 @@ def main():
13531384
'okta-unsuspend-user': unsuspend_user_command,
13541385
'okta-reset-factor': reset_factor_command,
13551386
'okta-set-password': set_password_command,
1387+
'okta-expire-password': expire_password_command,
13561388
'okta-add-to-group': add_user_to_group_command,
13571389
'okta-remove-from-group': remove_from_group_command,
13581390
'okta-get-groups': get_groups_for_user_command,

Packs/Okta/Integrations/Okta_v2/Okta_v2.yml

Lines changed: 68 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ configuration:
1717
hiddenusername: true
1818
section: Connect
1919
required: false
20+
display: ''
2021
- display: API Token (see detailed instructions)
2122
name: apitoken
2223
type: 4
@@ -90,7 +91,7 @@ script:
9091
description: Okta account factor ID.
9192
type: String
9293
- contextPath: Account.Factor.Provider
93-
description: Okta account factor provider
94+
description: Okta account factor provider.
9495
type: String
9596
- contextPath: Account.Factor.Profile
9697
description: Okta account factor profile.
@@ -102,7 +103,7 @@ script:
102103
description: Okta account factor status.
103104
type: Unknown
104105
- arguments:
105-
- description: The user ID
106+
- description: The user ID.
106107
name: userId
107108
- description: Username for which to un-enroll an existing factor.
108109
name: username
@@ -149,7 +150,7 @@ script:
149150
name: groupId
150151
- description: Name of the group to remove the user from.
151152
name: groupName
152-
description: Removes a user from a group with OKTA_GROUP type
153+
description: Removes a user from a group with OKTA_GROUP type.
153154
name: okta-remove-from-group
154155
- arguments:
155156
- default: true
@@ -212,10 +213,8 @@ script:
212213
- default: true
213214
description: Term by which to search. Can be a first name, last name, or email address. The argument `term` or `advanced_search` is required.
214215
name: term
215-
required: false
216216
- description: Searches for users with a supported filtering expression for most properties, including custom-defined properties. The argument `term` or `advanced_search` is required.
217217
name: advanced_search
218-
required: false
219218
- description: The maximum number of results to return. The default and maximum is 200.
220219
name: limit
221220
- auto: PREDEFINED
@@ -322,7 +321,7 @@ script:
322321
- 'false'
323322
- description: Searches the name property of groups for matching values.
324323
name: query
325-
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \ntype eq \"OKTA_GROUP\" - Groups that have a type of OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
324+
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \n type eq \"OKTA_GROUP\" - Groups that have a type of OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
326325
name: filter
327326
description: Lists users in your organization.
328327
name: okta-list-users
@@ -616,7 +615,7 @@ script:
616615
- arguments:
617616
- description: Searches the name property of groups for matching values.
618617
name: query
619-
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \ntype eq \"OKTA_GROUP\" - Groups that have a type of OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
618+
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \n type eq \"OKTA_GROUP\" - Groups that have a type of OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
620619
name: filter
621620
- defaultValue: '200'
622621
description: The maximum number of results to return. The default is 200.
@@ -649,9 +648,9 @@ script:
649648
description: Description of the group.
650649
type: String
651650
- arguments:
652-
- description: 'Filters the lower time bound of the log events in the Internet Date/Time Format profile of ISO 8601. An example: 2017-05-03T16:22:18Z'
651+
- description: 'Filters the lower time bound of the log events in the Internet Date/Time Format profile of ISO 8601. An example: 2017-05-03T16:22:18Z.'
653652
name: since
654-
- description: 'Filters the upper time bound of the log events in the Internet Date/Time Format profile of ISO 8601. An example: 2017-05-03T16:22:18Z'
653+
- description: 'Filters the upper time bound of the log events in the Internet Date/Time Format profile of ISO 8601. An example: 2017-05-03T16:22:18Z.'
655654
name: until
656655
- auto: PREDEFINED
657656
defaultValue: ASCENDING
@@ -1241,7 +1240,7 @@ script:
12411240
- arguments:
12421241
- description: The maximum number of results to return.
12431242
name: limit
1244-
description: Get an Okta Zone object
1243+
description: Get an Okta Zone object.
12451244
name: okta-list-zones
12461245
outputs:
12471246
- contextPath: Okta.Zone.created
@@ -1263,7 +1262,7 @@ script:
12631262
description: Zone name.
12641263
type: String
12651264
- contextPath: Okta.Zone.proxies.type
1266-
description: Proxies IP entry type e.g. CIDR
1265+
description: Proxies IP entry type e.g. CIDR.
12671266
type: String
12681267
- contextPath: Okta.Zone.proxies.value
12691268
description: Proxies IP entry value, e.g., 34.103.1.108/32.
@@ -1289,7 +1288,7 @@ script:
12891288
- description: 'Update Proxy IP addresses: CIDR range (1.1.0.0/16) or single IP address (2.2.2.2).'
12901289
isArray: true
12911290
name: proxyIPs
1292-
description: Update an Okta Zone
1291+
description: Update an Okta Zone.
12931292
name: okta-update-zone
12941293
outputs:
12951294
- contextPath: Okta.Zone.created
@@ -1326,10 +1325,10 @@ script:
13261325
description: Zone type, e.g., IP.
13271326
type: String
13281327
- arguments:
1329-
- description: Zone ID to get, e.g., nzoqsmcx1qWYJ6wYF0h.7
1328+
- description: Zone ID to get, e.g., nzoqsmcx1qWYJ6wYF0h.7.
13301329
name: zoneID
13311330
required: true
1332-
description: Get a Zone by its ID
1331+
description: Get a Zone by its ID.
13331332
name: okta-get-zone
13341333
outputs:
13351334
- contextPath: Okta.Zone.created
@@ -1366,14 +1365,14 @@ script:
13661365
description: Zone type, e.g., IP.
13671366
type: String
13681367
- arguments:
1369-
- description: Zone name
1368+
- description: Zone name.
13701369
name: name
13711370
required: true
13721371
- description: 'Update Gateway IP addresses: CIDR range (1.1.0.0/16) or single IP address (2.2.2.2).'
13731372
name: gateway_ips
13741373
- description: 'Update Proxy IP addresses: CIDR range (1.1.0.0/16) or single IP address (2.2.2.2).'
13751374
name: proxies
1376-
description: Creates a Zone with the specified name
1375+
description: Creates a Zone with the specified name.
13771376
name: okta-create-zone
13781377
- arguments:
13791378
- description: Name of the group to add.
@@ -1386,16 +1385,16 @@ script:
13861385
name: okta-create-group
13871386
outputs:
13881387
- contextPath: OktaGroup.ID
1389-
description: Group ID in Okta,
1388+
description: Group ID in Okta,.
13901389
type: Unknown
13911390
- contextPath: OktaGroup.Name
1392-
description: Group name in Okta,
1391+
description: Group name in Okta,.
13931392
type: Unknown
13941393
- contextPath: OktaGroup.Description
1395-
description: Group description in Okta,
1394+
description: Group description in Okta,.
13961395
type: Unknown
13971396
- contextPath: OktaGroup.Type
1398-
description: Group type in Okta,
1397+
description: Group type in Okta,.
13991398
type: Unknown
14001399
- arguments:
14011400
- description: Name of the group to assign to the app.
@@ -1404,11 +1403,57 @@ script:
14041403
name: groupId
14051404
- description: Friendly name of the app that the group will be assigned to.
14061405
name: appName
1407-
description: Assign a group to an application
1406+
description: Assign a group to an application.
14081407
name: okta-assign-group-to-app
1409-
dockerimage: demisto/python3:3.10.12.68714
1408+
- arguments:
1409+
- default: true
1410+
description: Okta username for which to expire the password.
1411+
name: username
1412+
required: true
1413+
- auto: PREDEFINED
1414+
defaultValue: 'false'
1415+
description: When true, you'll need to change the password in the next login.
1416+
name: temporary_password
1417+
predefined:
1418+
- 'true'
1419+
- 'false'
1420+
description: Expires a password for an existing Okta user.
1421+
execution: true
1422+
name: okta-expire-password
1423+
outputs:
1424+
- contextPath: Account.Activated
1425+
description: Timestamp for when the user was activated.
1426+
type: Date
1427+
- contextPath: Account.Created
1428+
description: Timestamp for when the user was created.
1429+
type: Date
1430+
- contextPath: Account.DisplayName
1431+
description: Okta account display name.
1432+
type: String
1433+
- contextPath: Account.Email
1434+
description: Okta account email.
1435+
type: String
1436+
- contextPath: Account.ID
1437+
description: Created Okta account ID.
1438+
type: String
1439+
- contextPath: Account.PasswordChanged
1440+
description: Timestamp for when the user's password was last changed.
1441+
type: Date
1442+
- contextPath: Account.Status
1443+
description: Okta account current status.
1444+
type: String
1445+
- contextPath: Account.StatusChanged
1446+
description: Timestamp for when the user's status was last changed.
1447+
type: Date
1448+
- contextPath: Account.Type
1449+
description: Okta account type.
1450+
type: String
1451+
- contextPath: Account.Username
1452+
description: Okta account usernames returned by the search.
1453+
type: String
1454+
dockerimage: demisto/python3:3.10.13.74666
14101455
runonce: false
1411-
script: '-'
1456+
script: ""
14121457
subtype: python3
14131458
type: python
14141459
fromversion: 5.0.0
Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,4 @@
11
Okta V2
22
-
33
For information on getting your Okta API token, see the Okta documentation.
4-
https://developer.okta.com/docs/api/getting_started/getting_a_token
5-
6-
7-
---
8-
[View Integration Documentation](https://xsoar.pan.dev/docs/reference/integrations/okta-v2)
4+
https://developer.okta.com/docs/api/getting_started/getting_a_token

Packs/Okta/Integrations/Okta_v2/README.md

Lines changed: 59 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2404,4 +2404,62 @@ There is no context output for this command.
24042404
```!okta-assign-group-to-app appName="Default-App" groupName="TestGroup"```
24052405
#### Human Readable Output
24062406

2407-
>Group: TestGroup added to PA App successfully
2407+
>Group: TestGroup added to PA App successfully
2408+
### okta-expire-password
2409+
2410+
***
2411+
Expires a password for an existing Okta user.
2412+
2413+
#### Base Command
2414+
2415+
`okta-expire-password`
2416+
2417+
#### Input
2418+
2419+
| **Argument Name** | **Description** | **Required** |
2420+
| --- | --- | --- |
2421+
| username | Okta username for which to expire the password. | Required |
2422+
| temporary_password | When true, you'll need to change the password in the next login. Possible values are: true, false. Default is false. | Optional |
2423+
2424+
#### Context Output
2425+
2426+
| **Path** | **Type** | **Description** |
2427+
| --- | --- | --- |
2428+
| Account.Activated | Date | Timestamp for when the user was activated. |
2429+
| Account.Created | Date | Timestamp for when the user was created. |
2430+
| Account.DisplayName | String | Okta account display name. |
2431+
| Account.Email | String | Okta account email. |
2432+
| Account.ID | String | Created Okta account ID. |
2433+
| Account.PasswordChanged | Date | Timestamp for when the user's password was last changed. |
2434+
| Account.Status | String | Okta account current status. |
2435+
| Account.StatusChanged | Date | Timestamp for when the user's status was last changed. |
2436+
| Account.Type | String | Okta account type. |
2437+
| Account.Username | String | Okta account usernames returned by the search. |
2438+
2439+
#### Command example
2440+
```!okta-expire-password username="[email protected]" temporary_password="false"```
2441+
#### Context Example
2442+
```json
2443+
{
2444+
"Account": {
2445+
"Activated": "2022-06-20T04:48:04.000Z",
2446+
"Created": "2022-06-20T04:47:59.000Z",
2447+
"DisplayName": "Test 1 Test1",
2448+
"Email": "[email protected]",
2449+
"ID": "00u19cr5qv91HjELI0h8",
2450+
"PasswordChanged": "2022-06-20T04:48:07.000Z",
2451+
"Status": "PASSWORD_EXPIRED",
2452+
"StatusChanged": "2023-09-10T12:56:04.000Z",
2453+
"Type": "Okta",
2454+
"Username": "[email protected]"
2455+
}
2456+
}
2457+
```
2458+
2459+
#### Human Readable Output
2460+
2461+
>### Okta Expired Password
2462+
>|_links|activated|created|credentials|id|lastUpdated|passwordChanged|profile|status|statusChanged|type|
2463+
>|---|---|---|---|---|---|---|---|---|---|---|
2464+
>| suspend: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8/lifecycle/suspend", "method": "POST"}<br/>schema: {"href": "https://test.oktapreview.com/api/v1/meta/schemas/user/osc66lckcvDyVcGzS0h7"}<br/>resetPassword: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8/lifecycle/reset_password", "method": "POST"}<br/>forgotPassword: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8/credentials/forgot_password", "method": "POST"}<br/>expirePassword: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8/lifecycle/expire_password", "method": "POST"}<br/>changeRecoveryQuestion: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8/credentials/change_recovery_question", "method": "POST"}<br/>self: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8"}<br/>type: {"href": "https://test.oktapreview.com/api/v1/meta/types/user/oty66lckcvDyVcGzS0h7"}<br/>changePassword: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8/credentials/change_password", "method": "POST"}<br/>deactivate: {"href": "https://test.oktapreview.com/api/v1/users/00u19cr5qv91HjELI0h8/lifecycle/deactivate", "method": "POST"} | 2022-06-20T04:48:04.000Z | 2022-06-20T04:47:59.000Z | password: {}<br/>recovery_question: {"question": "whats the first school?"}<br/>provider: {"type": "OKTA", "name": "OKTA"} | 00u19cr5qv91HjELI0h8 | 2023-09-10T12:56:04.000Z | 2022-06-20T04:48:07.000Z | firstName: Test 1 <br/>lastName: Test1<br/>preferredLanguage: en<br/>mobilePhone: null<br/>city: Tel-Aviv<br/>displayName: Test 1 that<br/>nickName: Testush<br/>secondEmail: null<br/>login: [email protected]<br/>email: [email protected]<br/>employeeNumber: 12345 | PASSWORD_EXPIRED | 2023-09-10T12:56:04.000Z | id: oty66lckcvDyVcGzS0h7 |
2465+

Packs/Okta/Integrations/Okta_v2/example.txt

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,5 @@ okta-get-zone zoneID=nzoqsmcx1qWYJ6w3355
2525
okta-update-zone zoneID=nzoqsmcx1qWYJ6w3355 zoneName=MyZone
2626
okta-list-zones
2727
okta-create-zone name="test_xsoar_4" gateway_ips="8.8.8.8"
28-
okta-list-users filter=`lastUpdated gt "2015-04-30T00:00:00.000Z"` limit=10
28+
okta-list-users filter=`lastUpdated gt "2015-04-30T00:00:00.000Z"` limit=10
29+
okta-expire-password username="[email protected]" temporary_password="false"

Packs/Okta/ReleaseNotes/3_2_0.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
2+
#### Integrations
3+
4+
##### Okta v2
5+
6+
- Added the okta-expire-password command which allows users to expire passwords for Okta users.
7+
- Updated the Docker image to: *demisto/python3:3.10.13.74666*.

Packs/Okta/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Okta",
33
"description": "Integration with Okta's cloud-based identity management service.",
44
"support": "xsoar",
5-
"currentVersion": "3.1.29",
5+
"currentVersion": "3.2.0",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

0 commit comments

Comments
 (0)