methodokta provides security operators with a number of data-rich Okta enumeration capabilities to help them gain visibility into their Okta Instance. Designed with data-modeling and data-integration needs in mind, methodokta can be used on its own as an interactive CLI, orchestrated as part of a broader data pipeline, or leveraged from within the Method Platform.
The number of security-relevant Okta resources that methodokta can enumerate are constantly growing. For the most up to date listing, please see the documentation here
To learn more about methodokta, please see the Documentation site for the most detailed information.
Quick Start
Get methodokta
For the full list of available installation options, please see the Installation page. For convenience, here are some of the most commonly used options:
General Usage
methodokta <resource> enumerate
Examples
methodokta user enumerate
methodokta group enumerate
Contributing
Interested in contributing to methodokta? Please see our Contribution page.
Want More?
If you're looking for an easy way to tie methodokta into your broader cybersecurity workflows, or want to leverage some autonomy to improve your overall security posture, you'll love the broader Method Platform.
For more information, see [https://method.security]
methodokta is a Method Security open source project.
Learn more about Method's open source source work by checking out our other projects here.
Have an idea for a Tool to contribute? Open a Discussion here.