Using Okta, Azure, GitHub or Google Group selector with SSH with Access for Infrastructure resulting in users having unauthorized access to infrastructure targets


Incident resolved in 11h38m47s

Resolved

This incident has been resolved.

1734166734

Update

A fix has been implemented and we are monitoring the results.

1734166334

Update

The issue has been identified and a fix is being implemented.

1734128661

Investigating

When an Okta, Azure, GitHub or Google Group selector is used, all SSH policies will match to users having unauthorized access to infrastructure targets. Users must still pass all other components of the policy. Infrastructure Access applications without the affected Group Selectors and all other Access application types are not impacted.

1734124807