Collect OneLogin Single Sign-On (SSO) logs

Supported in:

This document describes how you can collect OneLogin Single Sign-On (SSO) logs by configuring OneLogin Event Webhooks and Google Security Operations HTTPS Webhooks.

For more information, see Data ingestion to Google Security Operations.

Configure Google SecOps HTTPS Webhook

Create an HTTPS webhook feed

  1. From the Google Security Operations menu, select Settings > Feeds.
  2. Click Add new.
  3. In the Feed name field, enter a name for the feed.
  4. In the Source Type list, select Webhook.
  5. Select OneLogin as the Log type.
  6. Click Next.
  7. Optional: Enter values for the following input parameters:
    1. Split delimiter: leave blank.
    2. Asset namespace: the asset namespace.
    3. Ingestion labels: the label to be applied to the events from this feed.
  8. Click Next.
  9. Review your new feed configuration, and then click Submit.
  10. Click Generate Secret Key to generate a secret key to authenticate this feed.
  11. Copy and store the secret key as you cannot view this secret again. You can generate a new secret key, but regeneration of the secret key makes the previous secret key obsolete.
  12. From the Details tab, copy the feed endpoint URL from the Endpoint Information field. Enter this endpoint URL in your OneLogin Event Webhook.
  13. Click Done.

Create an API key for the HTTPS webhook feed

  1. Go to the Google Cloud console console Credentials page.
  2. Click Create credentials, and then select API key.
  3. Copy and store the API key.
  4. Restrict the API key access to the Chronicle API.

Configure OneLogin Event Webhook

The OneLogin Event Webhook lets you stream OneLogin event data to Google Security Operations which accepts data in JSON format. This integration lets you monitor activities, alert on threats, and execute event-based identity related workflows across your OneLogin and Google Security Operations environment.

  1. Log on to the OneLogin admin portal.
  2. Go to the Developers tab > Webhooks > New Webhook, and then choose Event Webhook for Log Management.
  3. Enter the following details:

    • In the Name field, enter Google SecOps.
    • In the Format field, enter SIEM (NDJSON).
    • In the Listener URL, enter the Google SecOps Webhook endpoint that will receive the event data from OneLogin.
    • In the Custom Headers, enable authentication by specifying the API key and secret key as part of the custom header in the following format:

    X-goog-api-key:API_KEY

    X-Webhook-Access-Key:SECRET

  4. Click Save. Refresh the page to see the new webhook in your OneLogin Event Broadcasters as connected.