Outlier Detected
Event Context
The 'Outlier Detected' event trigger notifies subscribed applications of any identities that have unusual access when compared to their peers. Outliers are calculated daily, and any identities that are flagged as outliers will be sent to subscribers of the trigger.
This is an example input from this trigger:
{
"identity": {
"id": "ee769173319b41d19ccec6cea52f237b",
"displayName": "John Doe",
"type": "IDENTITY"
},
"outlierType": "LOW_SIMILARITY",
"score": 0.82
}
outlierType
- OnlyLOW_SIMILARITY
is supported at this time.score
- The range is0.0
to1.0
. The higher the score, the more likely the identity is an outlier.
Prerequisites
Before consuming this event trigger, the following prerequesites must be met:
- Your organization must have Access Insights to access Identity Outliers.
- Your organization must have configured a source and loaded account data.
- Your organization’s account data must be onboarded into AI-Driven Identity Security.
Important
If you don't meet the prerequisites and you subscribe to this event trigger, you will not receive any events. The prerequisites must be met in order to receive events.
Additional Information and Links
- Identity outliers documentation
- Trigger Type: FIRE_AND_FORGET