Skip to main content

Okta: Access Integrations

S
Written by Shannon DeLange
Updated this week

About this article

Vanta integrates with Okta to monitor and manage access to your tools. By syncing user access data, Vanta helps ensure that only active employees retain access and that access is promptly removed when personnel leave—supporting automated compliance needs, streamlined access reviews, and automated access requests.

Estimated setup time: Less than [15] minutes

How it works

Vanta connects to Okta to sync users, groups, and roles data on a regular basis. This data powers three key workflows in Vanta:

  • Automated compliance tests: Vanta automatically checks that accounts are linked to employees, MFA is enabled, and deprovisioned when personnel leave.

  • Access Reviews: Synced users are surfaced in Vanta's Access Reviews and approvers can validate whether access is still appropriate, confirm least-privilege access, and provide evidence for audits.

  • Access Requests - Entitlements from Okta are pulled into Vanta. Requesters can ask for specific access levels, approvers can review with context, and system admins can track provisioning.

Use Cases

Connecting Okta to Vanta will enable you to:

  • Monitor and manage personnel access to Okta in real time

  • Ensure only active employees retain access to company systems

  • Verify MFA enrollment across all user accounts

  • Track admin role assignments and privileged access

  • Simplify access reviews and support compliance requirements

  • Enable single sign-on (SSO) for Vanta users through Okta

Requirements

  • Vanta administrator account

  • Okta Super Administrator account (required to authorize API access and create app integrations)

Connect the integration

Step 1

  • Create Okta API Service App Integration

    • Log in to your Okta account as a Super Administrator

    • From the left-hand navigation panel, select Applications.

    • Select Create App Integration.

  • Select API services and choose Next

  • Title the App integration name

    • We recommend using a name that signifies its relation to Vanta

  • Select Save

  • Select Okta API Scopes and grant Vanta access to the following read-only items:-

    • okta.appGrants.read

    • okta.apps.read

    • okta.groups.read

    • okta.policies.read

    • okta.roles.read

    • okta.users.read

Note: Adding permissions outside of the required list above can cause issues.

  • Under "General Settings," you must uncheck the following box that says Require Demonstrating Proof of Possession (DPoP) header in token requests. Vanta does not currently provide Proof of Possession, so leaving this box checked will prevent you from being able to complete the integration.

Note: Reload the app page and confirm that the check box has not been checked. There is an issue where the box remains checked after being updated for the first time. Confirm before continuing the connection.

  • Note: If the API Service App supports Admin Roles, assign the Super Administrator role to the app. This is required for the Vanta integration.

  • Note: If you receive the below error when trying to Validate in Vanta, assign the Super Administrator role to the app. This is required for the Vanta integration.

  • Note: Assign the Super Administrator role to the application. This step is required for the Vanta integration to function correctly.

Step 2

  • Locate your Okta Client ID and Okta Domain

  • Login to Vanta and open the Integrations Page

  • Search for Okta in the Available Tab

  • Select Connect

  • Paste your Okta Domain and Client ID into the appropriate fields:

  • Select Next. A new pop-up modal will appear.

  • Copy the URL from Step 5 (paste it somewhere safe).

You will need the URL from step 5 in the Okta platform

  • Do not select Validate (This will happen during a later step)

Step 3

  • Return to Okta and find your App Integration.

  • From the General tab, select Edit and choose Public Key / Private Key for Client authentication.

  • Under the Public Keys section, select Use a URL to fetch keys dynamically.

  • Paste the URL obtained from the pop-up modal back into the open Okta field.

  • Select Save

Step 4

  • Return to Vanta

  • Select Validate from the pop-up Modal

Note: If you would also like to enable SSO for all or specific users, Wait to select 'connect app' on the connection modal - Follow the below steps first:

Step 1: Installing the Vanta SAML App in Okta

Under Applications, select Browse App Catalog:

Once you've located the Vanta SAML App, Select it and Add Integration:

  • Return to Vanta and copy your Domain ID, this will be needed in the next step.

Step 2: Configuring Sign-on settings:

  • Under Applications, click on the Vanta application.

    • In the following screen, click on the Sign On tab and then Edit.

  • Find Advanced Sign-on Settings and paste the Vanta domain ID into the Domain ID field.

  • Select Save

Step 3: Adding your User assignments

You can now add your User Assignments for SSO Login via the Assignments section of the Vanta SAML Okta App:

  • Select the Assignments tab and click Assign. From there, assign the Okta application to the proper users/groups using SSO to login to Vanta.

Step 4: Connecting the app on Vanta

Once you've configured the Vanta SAML App in Okta, You can click 'Connect App' in Vanta:

  • Return to Vanta and select Connect app

  • Once connected, you should see an alert indicating the Okta Login app has been successfully connected. You will then be returned to the Integrations Page.

Creating multiple Vanta Okta apps for Workspaces

If you use Vanta Workspaces, you can add multiple Vanta apps in Okta, one for each Workspace.

  • Follow the same steps under “Add Vanta to your Okta Account”.

  • When you select Add Integration and complete the prompts under General settings, ensure the app label contains Vanta (name must be exact).

  • You can choose to customize the text in the parentheses.

When you connect Okta on the Integrations page, we will recognize if you have multiple Vanta apps in Okta. After adding your API Token and Okta domain, you’ll see a prompt on the next step to select the Vanta app you want to connect.

If you have connected your Okta app before June 22, 2023, and then disconnected, the above process will need to be followed.

Synced Data

Connecting Okta to Vanta syncs the following user data, which is essential for access control, compliance testing, and reviews within Vanta:

Synced User Information:

  • User Profile: Includes name, email address, job title, employee number, and profile information.

  • Access & Security Status: Information on admin status, assigned roles, Multi-Factor Authentication (MFA) enrollment, and group memberships.

  • Account Status: Current account status and activation information.

  • Application Access: Data about applications users have access to through Okta.

This integrated data is critical for Vanta's functions, supporting features like Access Reviews, Access Requests, and automated compliance tests to help maintain strong access controls and meet required compliance standards.

Capabilities

Resource

Supported

Usage

Users

Groups

Roles/Entitlements

Applications

Permissions

Vanta accesses the following data from the Okta API using read-only OAuth grant types

Vanta will be able to read:

  • Data about your users

    • Needed to confirm that only active employees retain system access and that terminated employees are deprovisioned promptly. In Access Requests, this allows Vanta to display available users when tracking or assigning access.

  • Data about user groups

    • Needed to validate least-privilege access and confirm group-based access controls align with compliance requirements. In Access Requests, this enables approvers to see which groups grant access and map access levels to entitlements.

  • Data about admin roles and role assignments

    • Needed to ensure employees are assigned to correct roles, validate least-privilege access, and confirm that high-privilege roles (e.g., Super Administrator) are only granted to authorized personnel. In Access Requests, this allows requesters to choose from the correct set of roles and ensures approvers can review what level of access is being requested.

  • Data about applications and application grants

    • Needed to discover which applications users have access to through Okta, supporting access audits and ensuring proper access controls.

  • Data about policies

    • Needed to understand access policies and validate that access controls align with compliance requirements.

Vanta will be able to write:

  • Nothing (Vanta does not have write permission)

Related Articles

Troubleshooting FAQ

I don't see roles available when creating an access level in Vanta.

  • Likely cause: The required Okta API scopes may not have been granted during app integration setup. Verify that all required read-only scopes (okta.roles.read, okta.apps.read, etc.) are granted in your Okta API Service App Integration.

Only some of my users are appearing in Vanta.

  • Likely cause: You may have IDP scoping configured to limit which users are synced. Check your scoping configuration and ensure all desired users are included.

I'm getting an error when trying to Validate in Vanta.

  • Likely cause: The Super Administrator role may not have been assigned to the API Service App. Return to Okta and ensure the Super Administrator role is assigned to the app integration. This is required for the Vanta integration to function correctly.