Okta ThreatInsight maintains a constantly evolving list of IPs that exhibit suspicious behaviors suggestive of malicious activity. Authentication requests associated with an IP in this list can be logged in System Log and blocked. The Okta ThreatInsight Configuration API provides operations to manage your ThreatInsight configuration.
In order to prevent abuse, Okta ThreatInsight works in a limited capacity for free trial editions. Please contact Okta support if fully functional Okta ThreatInsight is required.
okta.threatInsights.read
Retrieves current ThreatInsight configuration
Success
Forbidden
Too Many Requests
{- "action": "string",
- "created": "2019-08-24T14:15:22Z",
- "excludeZones": [
- "string"
], - "lastUpdated": "2019-08-24T14:15:22Z",
- "_links": {
- "self": {
- "hints": {
- "allow": [
- "DELETE"
]
}, - "href": "string",
- "name": "string",
- "type": "string"
}
}
}
okta.threatInsights.manage
Updates ThreatInsight configuration
Success
Bad Request
Forbidden
Too Many Requests
{- "action": "string",
- "excludeZones": [
- "string"
]
}
{- "action": "string",
- "created": "2019-08-24T14:15:22Z",
- "excludeZones": [
- "string"
], - "lastUpdated": "2019-08-24T14:15:22Z",
- "_links": {
- "self": {
- "hints": {
- "allow": [
- "DELETE"
]
}, - "href": "string",
- "name": "string",
- "type": "string"
}
}
}