Home Solutions Okta Integration

Okta Trust Integration

Map Okta System Log events to DAT trust signals. Query trust scores for policy decisions. Bridge enterprise IAM with behavioral trust—so your identity provider knows not just who an agent is, but how it behaves.

Your Okta Events, Our Trust Signals

Nine Okta System Log event types automatically mapped to DAT's behavioral trust model.

Identity Events Become Trust Evidence

Every time an agent authenticates through Okta—successful MFA, failed sign-on, account lockout, threat detection—DAT captures that event and converts it into a weighted trust signal. No manual mapping. No custom code. Connect your Okta Event Hook and trust scores update in real time.

  • Session Start / MFA / SSO — Mapped to success signals. Agents earn trust through proper authentication
  • Sign-On Failure / Token Revoke — Mapped to failure signals. Repeated failures degrade reliability scores
  • Account Lockout / Unauthorized Access — Mapped to violation signals. Compliance and security pillars impacted
  • Threat Detected — Mapped to fraud signals. Triggers immediate investigation with shadow scoring
  • Lifecycle Deactivate — Mapped to blocked signals. Decommissioned agents lose access immediately

Every signal carries full Okta attribution: event type, event ID, severity, outcome, and actor display name. Your audit trail traces every trust change back to the exact Okta event that caused it.

Okta Event -> DAT Signal Mapping
==============================

Okta Event           | DAT Signal
---------------------|----------
user.session.start   | success
auth_via_mfa         | success
sso                  | success
sign_on.fail         | failure
token.revoke         | failure
account.lock         | violation
unauth_app_access    | violation
threat.detected      | fraud
lifecycle.deactivate | blocked

Signal Metadata:
{
  source: "third_party",
  integration: "okta",
  oktaEventType: "user.session.start",
  oktaEventId: "tev123abc",
  oktaSeverity: "INFO",
  oktaOutcome: "SUCCESS",
  actorDisplayName: "Agent-7B",
  pillar: "reliability",
  timestamp: "2026-03-04T..."
}

Trust-Informed Policy Decisions

Query DAT trust scores from your Okta workflows to make smarter access control decisions.

Four Trust Tiers for Adaptive Access

Okta tells you who an agent is. DAT tells you whether to trust it right now. Query the trust API from your Okta policies to get tier-based recommendations that translate behavioral trust into actionable access decisions—from full access to complete denial.

  • Allow (85-100) — Agent has earned full access. Proceed without additional checks
  • Monitor (70-84) — Agent is trustworthy but watch for anomalies. Log all actions
  • Step-Up Authentication (50-69) — Require additional verification before granting access
  • Deny (0-49) — Trust too low. Block access and alert the security team

Batch queries support up to 100 DIDs in a single request, and Redis-cached DID mappings ensure sub-millisecond lookups from Okta actor IDs to DAT agent identities.

Trust Query API
==============================

GET /gateway/okta/trust/:agentDid

Response:
{
  "trustScore": 82.4,
  "tier": "allow_with_monitoring",
  "recommendation": "monitor",
  "pillars": {
    "reliability": 85,
    "performance": 78,
    "compliance": 90,
    "security": 72,
    "reportingFidelity": 80
  }
}

Batch Query (up to 100 DIDs):
POST /gateway/okta/trust/batch
{
  "agentDids": [
    "did:dat:testnet:agent_abc",
    "did:dat:testnet:agent_def",
    ...
  ]
}

DID Mapping (Redis):
  Okta Actor ID <-> DAT Agent DID
  Bidirectional lookup
  Sub-millisecond resolution

Proven in Production

The full pipeline has been verified on a live Okta tenant—from login event to on-chain reputation.

From Okta Login to Ethereum in Under 5 Minutes

This is not a demo. A real Okta tenant with a verified Event Hook feeds live authentication events into DAT's trust pipeline. The result: a user logs into Okta, DAT records the trust signal, recalculates the agent's score, and the ERC-8004 bridge syncs the updated reputation to the Sepolia blockchain.

  • Event Hook Verified — One-time verification challenge completed on live Okta tenant
  • 4 Events Subscribed — MFA factor activated, user sign-in attempt, account unlock, user risk detected
  • DID Mapping Registered — Okta actor ID linked to DAT agent DID in Redis
  • Full Pipeline Proven — Okta login → gateway → reputation signal → trust score → ERC-8004 bridge → Sepolia transaction

For enterprises, this means your Okta investment becomes more valuable. Authentication events that were previously just audit logs now actively shape your agents' capabilities and on-chain identity.

Live Pipeline (Verified)
==============================

1. User logs into Okta
   Event: user.session.start
   Outcome: SUCCESS

2. Okta Event Hook fires
   POST /gateway/okta/hooks/events
   Authorization: Bearer {secret}

3. Gateway resolves actor DID
   Redis: dat:okta:mapping:{id}
   -> did:dat:testnet:agent_abc

4. Signal forwarded to reputation
   POST /api/v1/reputation/signal
   Type: action_success
   Source: third_party
   Description: "Okta:
     user.session.start (SUCCESS)"

5. Trust score recalculated
   Score: 55.0 -> 59.42

6. ERC-8004 bridge detects change
   delta >= 5 -> sync triggered

7. Sepolia transaction mined
   tx: 0xd1d52310...
   Score on-chain: 5942 (uint256)

Total time: < 5 minutes
9
Event Types
4
Trust Tiers
100
Batch DIDs
Live
Verified

Connect Okta to Behavioral Trust

Your identity provider already knows who your agents are. Now give it the intelligence to know how much to trust them.