Okta
Okta is an identity management service.
Features
Feature Name | Supported | Notes |
---|---|---|
Capture deletes | check | |
History mode | ||
Custom data | check | USER_CUSTOM_PROFILE table. |
Data blocking | check | |
Column hashing | check | |
Re-sync | check | |
API configurable | check | API configuration |
Priority-first sync | ||
Fivetran data models | ||
Private networking | ||
Authorization via API | check |
Setup guide
Follow our step-by-step Okta setup guide to connect Okta with your destination using Fivetran connectors.
Sync overview
To capture new records, we incrementally sync the following tables and their child tables:
DEVICE
GROUPS
SYSTEM_LOG
USERS
We also re-import the GROUPS
and USERS
tables once a week to capture the deletes.
Schema information
This schema applies to all Okta connectors.
Explore Okta schema ERD
API key permissions
Okta administrators manage all aspects of the end-user experience. Okta has many admin types, each with a unique set of permissions and restrictions. The following table outlines the different data tables and the API key permissions you need to sync them.
Table | API Key Permissions |
---|---|
DEVICE | Read-Only Admin, App Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin |
DEVICE_USER | Read-Only Admin, App Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin |
USER_TYPE | Read-Only Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
USER_CREDENTIALS_EMAIL | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, Report Admin, API Access Management Admin, Group Membership Admin |
USERS | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, Report Admin, API Access Management Admin, Group Membership Admin |
USER_ROLE | Super Admin |
RESOURCE | Super Admin |
RESOURCE_SET | Super Admin |
CUSTOM_ROLE | Super Admin |
CUSTOM_ROLE_PERMISSION | Super Admin |
GROUPS | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
GROUP_MEMBER | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
RULE | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
ASSIGN_USER_TO_GROUP_ID | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
GROUP_EXCLUDED_FROM_RULE | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
GROUP_LOGO_LINK | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
USER_EXCLUDED_FROM_RULE | Read-Only Admin, App Admin, Group Admin, Org Admin, Super Admin, Help desk Admin, API Access Management Admin, Group Membership Admin |
APPLICATION | Read-Only Admin, App Admin, Org Admin, Super Admin, API Access Management Admin |
APPLICATION_GROUP | Read-Only Admin, App Admin, Org Admin, Super Admin, API Access Management Admin |
APPLICATION_USER | Read-Only Admin, App Admin, Org Admin, Super Admin, API Access Management Admin |
GROUP_ROLE | Super Admin |
APPLICATION breakout child tables | Read-Only Admin, App Admin, Org Admin, Super Admin, API Access Management Admin |
SYSTEM_LOG | Super Admin, Org Admin, App Admin, Read-Only Admin, Mobile Admin, Report Admin, API Access Management Admin |
SYSTEM_LOG breakout child tables | Super Admin, Org Admin, App Admin, Read-Only Admin, Mobile Admin, Report Admin, API Access Management Admin |
PROFILE_MAPPING | Super Admin, App Admin |
POLICY | Super Admin, Org Admin, Read-Only Admin, API Access Management Admin |