BitLyft Air: OneLogin

Overview

The BitLyft AIR® OneLogin integration provides identity threat detection, investigation, and automated response capabilities for organizations using OneLogin as their identity and access management platform. By ingesting OneLogin activity logs and applying identity-focused detection policies, BitLyft AIR® enables security teams to monitor authentication activity, track configuration changes, and quickly respond to identity-based threats.

This integration helps organizations detect account compromise, privilege escalation, and risky configuration changes that could indicate malicious activity or unauthorized access.


Core Capabilities

Identity Threat Detection

The OneLogin integration includes security policies designed to identify suspicious authentication behavior, risky administrative activity, and identity configuration changes that could weaken security controls.

These detections help security teams surface early indicators of identity compromise and respond before attackers can escalate privileges or access sensitive applications.


Credential Abuse and Authentication Attacks

Authentication monitoring helps identify patterns associated with brute-force attacks, credential stuffing, or unauthorized login attempts.

Example detections include:

  • Multiple failed authentication attempts from a user or IP address

These alerts help identify potential password spraying, brute-force login attempts, or suspicious authentication behavior targeting OneLogin accounts.


Multi-Factor Authentication (MFA) Security Monitoring

Multi-factor authentication is a critical identity security control. Monitoring changes to MFA settings helps detect attempts to weaken authentication protections.

Example detection:

  • MFA disabled for a user account

This detection identifies when MFA protections are removed from an account, which may indicate attacker activity following initial credential compromise.


Privilege Escalation and Access Control Changes

Administrative role changes and privileged account activity are high-risk events that can indicate attempts to gain persistent access or expand privileges within the environment.

Example detections include:

  • Privilege escalation role changes

  • Password reset for privileged users

  • Suspicious deprovisioning events

These detections help identify unauthorized privilege assignments, compromised administrative accounts, or attempts to disrupt user lifecycle management.


Risky Identity and Application Configuration Changes

Changes to identity configurations or application assignments can introduce security risk or enable unauthorized data access.

Example detections include:

  • High-risk application assignment changes

  • API tokens created or modified

These alerts help security teams identify actions that could allow attackers to access applications, automate malicious activity, or bypass authentication protections.


Automated Response Capabilities

Compromised User Account Playbook

The OneLogin integration includes a Compromised User Account playbook designed to standardize incident response procedures for suspected identity compromise.

This playbook orchestrates response actions when identity-based threats are detected in OneLogin, helping security teams quickly investigate and contain incidents.

Key Benefits

  • Provides a structured response workflow for identity-related incidents

  • Enables rapid containment of compromised accounts

  • Reduces reliance on manual investigation and response procedures

  • Standardizes response actions across identity incidents

By pairing detection policies with automated response workflows, organizations can significantly reduce investigation time and accelerate incident containment.


Automation and Remediation

SOC-Ready Automations

The OneLogin integration includes SOC-ready automations that connect identity detections directly to remediation actions within BitLyft AIR®.

These automations allow security teams to move quickly from detection to response while maintaining consistent incident response practices.

Automation Benefits

  • Faster response to identity-based threats

  • Reduced manual investigation and remediation effort

  • Standardized remediation workflows across incidents

  • Improved operational efficiency for security teams

SOC-ready automations enable organizations to operationalize identity security by linking detection policies with automated response capabilities.


Security Value

The BitLyft AIR® OneLogin integration enhances identity security by helping organizations detect and respond to several common identity attack scenarios:

  • Credential abuse and authentication attacks

  • MFA weakening or removal

  • Privilege escalation and administrative misuse

  • Unauthorized application access changes

  • Identity lifecycle manipulation

By combining identity-focused detections, investigation workflows, and automated remediation capabilities, BitLyft AIR® helps organizations protect their OneLogin environments from identity-driven threats and reduce operational burden on security teams.


OneLogin Remediation Actions

Account Security & Compromise Response

ActionDescriptionUse Case
Force Password ResetTriggers an immediate password reset for a specified user in OneLogin.Used when an account is suspected of being compromised, such as following a phishing alert, credential exposure, or suspicious login attempt, to prevent further unauthorized access.
Lock User AccountTemporarily locks a specified user account in OneLogin, preventing authentication while preserving the account and associated data.Ideal for isolating users involved in suspicious behavior or when responding to insider threats. This action halts all user activity without deleting the account, preserving forensic evidence for investigation.
Force User Log OutImmediately terminates all active sessions for a specified user in OneLogin.Used when there is a risk that a threat actor has an active session, such as during account takeover or session hijacking. Ensures the user is logged out from all devices and applications.

Identity Investigation & Directory Visibility

ActionDescriptionUse Case
Retrieve User CountRetrieves the total number of users currently in the OneLogin directory.Useful for detecting anomalies or supporting audit and compliance efforts. A sudden change in user count could signal unauthorized provisioning or potential configuration issues.
Retrieve User ListRetrieves a comprehensive list of all users from the OneLogin directory.Supports investigations, compliance reporting, or incident triage by providing full visibility into user accounts. Useful for correlating login activity or reviewing account privileges.