SSO + SCIM, audit-log ingest, login-anomaly detection. SAML and OIDC supported.
Once connected, Okta telemetry flows into Nova's observability stack: signals join the service map, alerts route through Nova's correlation engine, and incidents tie back to the underlying Okta resources for root-cause analysis.
Two paths depending on your setup:
OAuth (recommended). Click connect in the Nova admin UI, sign in with your Okta account, scope down to read-only, done. Token rotation is handled automatically.
API key. For Okta accounts that don't support OAuth or for service-account workflows. Generate the key in Okta, paste it into Nova's integrations settings, and Nova validates the connection.
Read-only by default: events, metrics, logs, audit data. We do not modify your Okta configuration without explicit approval through Nova's policy envelope. Write actions (when enabled) go through the agent fleet with a full audit trail.