<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Read Only Impersonation Access System Logs Audit Events
Okta Identity Engine
Administration
Overview

Okta provides a transparent audit trail for all instances where Okta Support is granted access to the customer environment. Impersonation cannot occur without explicit approval from a Super Admin.

Applies To
  • Read Only Impersonation Access
  • Okta Identity Engine (OIE)
Solution

There are five specific event types used to track the lifecycle of support access, from the initial grant through session termination.

 

Event Types and Descriptions

Event TypeDescription
user.session.impersonation.grantRecorded when a Super Admin grants Okta Support access to the org. Use this to see who approved access and when.
user.session.impersonation.revokeRecorded when a Super Admin manually revokes support access before the original expiration time.
user.session.impersonation.extendRecorded when a Super Admin extends the duration of the currently active support access.
user.session.impersonation.initiateRecorded the moment an Okta Support Engineer actually signs into the org using the granted permission.
user.session.impersonation.endRecorded when the Support Engineer signs out, or the impersonation session expires/ends.

These logs ensure a full audit trail and guarantee that Okta Support access is always authorized by internal admins. By monitoring these five events, security teams can verify exactly who granted access, when the support session occurred, and when it concluded.

 

How to Search the Logs

The steps below can be followed to audit these actions:

  1. Log in to the Okta Admin Console.
  2. Navigate to Reports > System Log.
  3. In the search bar, enter the desired query using the eventType syntax.
    • Example: eventType eq "user.session.impersonation.initiate".
  4. Adjust the time range as needed and click the Search (magnifying glass) icon.
  5. Expand the log entry to view detailed information, including the actor and the timestamp.

 

Audit and Retention

  • Default Retention: All impersonation events are retained in the Okta System Log for 90 days.
  • Long-term Storage: If compliance requirements exceed 90 days, it is recommended to export these logs via the Okta API or stream them to a Security Information and Event Management (SIEM) system (for example, Splunk, Sumo Logic, or Datadog).

 

Related References

Loading
Read Only Impersonation Access System Logs Audit Events