-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x-pack/filebeat/input/entityanalytics/provider/internal/okta: relax profile shape #40359
Conversation
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
@@ -39,49 +39,12 @@ type User struct { | |||
PasswordChanged *time.Time `json:"passwordChanged,omitempty"` | |||
Type map[string]any `json:"type"` | |||
TransitioningToStatus *string `json:"transitioningToStatus,omitempty"` | |||
Profile Profile `json:"profile"` | |||
Profile map[string]any `json:"profile"` | |||
Credentials *Credentials `json:"credentials,omitempty"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add the recovery_question.question to the credentials object please. That is field also part of a feature request.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll add it, but I think this is not a safe change. I would like to get input from infosec on their views on its inclusion given that knowledge of the question will give significant information to an attacker that has details about a victim.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm checking with the user to understand what their use case is for having this information is. If they actually do want it and understand the risk, then maybe this should be opt-in in some manner.
…rofile shape The deserialisation of profile data was into a struct, preventing custom profile fields from being collected. So replace these types with a generic container.
This reverts commit 562ccb2. To be included in a future PR pending design decisions.
…rofile shape (#40359) The deserialisation of profile data was into a struct, preventing custom profile fields from being collected. So replace these types with a generic container. (cherry picked from commit 99c1138) # Conflicts: # x-pack/filebeat/input/entityanalytics/provider/okta/internal/okta/okta_test.go
…r/internal/okta: relax profile shape (#40439) * x-pack/filebeat/input/entityanalytics/provider/internal/okta: relax profile shape (#40359) The deserialisation of profile data was into a struct, preventing custom profile fields from being collected. So replace these types with a generic container. (cherry picked from commit 99c1138) # Conflicts: # x-pack/filebeat/input/entityanalytics/provider/okta/internal/okta/okta_test.go * resolve conflicts --------- Co-authored-by: Dan Kortschak <[email protected]>
Proposed commit message
The deserialisation of profile data was into a struct, preventing custom profile fields from being collected. So replace these types with a generic container.
Checklist
CHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.Disruptive User Impact
Author's Checklist
How to test this PR locally
Related issues
Use cases
Screenshots
Logs