About Resume Projects Blog Contact
Dark mode
โ† Back to projects
Security & Audit Python Web App

Admin
Audit App

A web application that audits Okta administrator accounts in real time โ€” surfacing inactive admins, flagging privilege anomalies, and showing last-action timestamps so IT teams can enforce least-privilege access without manual digging.

100%
Admin visibility
<30s
Full audit runtime
0
Manual steps

Admin sprawl is a silent risk

In most Okta tenants, administrator access accumulates over time. Someone gets elevated for a one-off task and never gets downgraded. A contractor leaves but their account stays active with super-admin privileges. A role is assigned "temporarily" and then forgotten.

The standard Okta admin console gives you a list of admins โ€” but no context. No last-login date, no last action, no flag for accounts that haven't touched anything in 90 days. Doing a proper admin audit manually meant cross-referencing the system log, the admin list, and individual account details one by one.

Audit at a glance

The app pulls all admin-role assignments from the Okta API, enriches each account with last-login and last-action data from the System Log, and presents everything in a clean dashboard โ€” sortable by role level, last activity, and account status.

01
Pull all admin assignments
Queries the Okta API for all users with administrator roles โ€” including Super Admin, Org Admin, App Admin, and Group Admin. Captures role type, assignment date, and account status for each.
02
Enrich with System Log activity
For each admin account, queries the Okta System Log to find the last admin action taken โ€” including what action it was, when, and from which IP. Accounts with no log activity in 90+ days are flagged automatically.
03
Surface anomalies
Flags accounts that are deactivated but still hold admin roles, service accounts with super-admin privileges, and users whose last login predates their most recent admin action (a common indicator of credential sharing).
04
Export for compliance
Generates a timestamped CSV export of all admin accounts and their activity โ€” ready for compliance reviews, SOC 2 audits, or internal security reviews.

Built with

Python
Backend & API logic
Flask
Web framework
Okta API
Admin data source
Okta System Log
Activity enrichment
HTML / CSS
Dashboard UI
CSV Export
Compliance output

The result

What used to be a multi-hour manual process โ€” cross-referencing the admin list against the system log โ€” became a 30-second dashboard check. The team can now run admin audits on demand, before any compliance review, or as part of a quarterly access review process.

The first audit using the tool identified 4 accounts with elevated privileges that should have been downgraded months earlier โ€” including one belonging to a former contractor whose account had never been fully deactivated.

IR
Izzi Renan
IT Systems Administrator at Forter. Managing Okta, Google Workspace, and Jamf Pro for 500+ users across EMEA, APAC, and Israel. 10 years in IT.