Using Okta, Azure, GitHub or Google Group selector with SSH with Access for Infrastructure resulting in users having unauthorized access to infrastructure targets
Resolved
This incident has been resolved.
Update
A fix has been implemented and we are monitoring the results.
Update
The issue has been identified and a fix is being implemented.
Investigating
When an Okta, Azure, GitHub or Google Group selector is used, all SSH policies will match to users having unauthorized access to infrastructure targets. Users must still pass all other components of the policy. Infrastructure Access applications without the affected Group Selectors and all other Access application types are not impacted.