Search

Search by Category

All Posts

OneLogin Data Breach – How to Secure Your Data

OneLogin is a password manager and single sign on (SSO) provider with millions of customers in dozens of countries. The company offers password and authentication services that allow corporate users to store all their password and sensitive data in the cloud and access that information using a single password.

Password managers and SSO can be highly convenient and offer increased security by allowing users to store different and stronger passwords for many services that require authentication, only having to remember one password to access them all. This arrangement relies absolutely on the company storing all the passwords having the strictest security. Millions of passwords stored by one company is, of course, a highly tempting target for hackers.

OneLogin announced on May 31, 2017 its US data center had been breached by unknown parties and encrypted and unencrypted customer data was stolen. If sensitive information falls into the wrong hands, provided it is encrypted, it remains unusable. Worryingly, OneLogin reported the hackers may also have obtained a means to decrypt encrypted data.

The net result of this incident is the potential exposure of millions of customers and the myriad of online services protected by the credentials that have been stolen.

Is Your OneLogin Data at Risk?

OneLogin password manager data breach

This is uncertain as the full extent of the breach and the number of affected customers has not been detailed. OneLogin has stated that some of its customer data was stolen from one data center. The company has since closed the breach to prevent further exploits and has hired an outside security specialist to fully investigate how the exploit was conducted.

We have implemented several improvements to strengthen our infrastructure to help mitigate the risk of future intrusion.

Whether your account has been compromised or not, you should still take all recommended steps to secure your data. OneLogin recommends you change your passwords (yes, all of them, for every service you have stored) and, if you use these features, generate new API keys for all services, create new OAuth tokens and create new security certificates.

OneLogin also stated information stored in its Secure Notes feature can be decrypted, so you may want to review policies related to using the feature to store sensitive information.

[utah_video_youtube id=”https://www.youtube.com/watch?v=J1AUS66-QHE”]

OneLogin Instructions to Secure Your Account

OneLogin has issued detailed and somewhat complex instructions that all customers should follow immediately in order to secure their accounts.

On Wednesday, May 31, 2017, we detected that there was unauthorized access to OneLogin data in our US data region. All customers served by our US data center are affected; customer data was compromised, including the ability to possibly decrypt some encrypted data. We have since blocked this unauthorized access, reported the matter to law enforcement, and are working with an independent security firm to assess how the unauthorized access happened and to verify the extent of the impact. We want our customers to know that the trust they have placed in us is paramount, and we have therefore created a set of required actions:
  1. If you replicate your directory password to provisioned applications (using the SSO Password feature) or if your users authentication method is OneLogin as a directory, force a OneLogin directory password reset for your users.

    You don’t need to reset directory passwords if you don’t use the SSO Password feature or if your users authenticate using Active Directory!

    See Password Management.

  2. Generate new certificates for your apps that use SAML SSO.

  3. Generate new API credentials and OAuth tokens.

  4. Generate and apply new directory tokens for Active Directory Connectors and LDAP Directory Connectors.

    For Active Directory Connectors:

    1. Create a new failover Active Directory Connector instance, following steps 1- 5a in “Adding additional ADC instances for load balancing and failover.”
    2. Copy the installation token for the new failover over the existing primary Active Directory Connector token on the server where the Active Directory Connector instance runs, replacing the contents of the Windows Registry key at
      HKEY_Local_Machine\SOFTWARE\Wow6432Node\OneLogin, Inc.\Active Directory Connector\DirectoryToken
    3. Restart the Active Directory Connector.
    4. Switch the new failover Active Directory Connector instance to be the primary (sync) connector, following the instructions in “Failing over a synchronization Active Directory Connector instance manually.”
    5. Delete the old Active Directory Connector instance from OneLogin by following the instructions in “Deleting or disabling your Active Directory Connector instance.”

    For LDAP Directory Connectors:

    1. Create a new failover LDAP Directory Connector instance, following steps 1 – 6 in Installing Multiple LDAP Directory Connectors for High Availability.
    2. Copy the token from the new instance to the config file for your existing active LDAP Directory Connector by editing the file conf/ldc.conf and updating the configuration property ldc.api.token. (See steps 9 and 10 in “Installing an LDAP Directory Connector“)
    3. Restart the LDAP Directory Connector.
    4. Switch the new failover LDAP Directory Connector instance to be the active connector, following the instructions in “Switching a standby connector to active.”
    5. Remove the old LDAP Directory Connector instance from OneLogin by clicking Delete on the Basic tab of the LDAP Directory Connector configuration page (Go to Users > Directories, select the directory, go to the Basic tab, and select the instance to delete).
  5. Update the API or OAuth credentials you use to authenticate to third-party directories like G Suite (Google), Workday, Namely, and UltiPro.

    For details, see:

  6. Generate and apply new Desktop SSO tokens.

    • If you use Active Directory Connectors for Desktop SSO, you should generate and apply new directory tokens, as described above.
    • If you use a remote authentication script running in IIS (rather than Active Directory Connectors), go to Settings > Desktop SSO, scroll down to Redirect URLs, select Fixed URL, click Generate new token, and copy the new token to your remote authentication script. For more details, see Configuring Desktop SSO Using a Remote Authentication Script in IIS.
  7. Recycle any secrets stored in Secure Notes.

    See Secure Notes.

  8. Update the credentials you use to authenticate to 3rd party apps for provisioning.

    Some apps use OAuth, others use API keys. For information about the apps you use, view the provisioning doc for those apps in the App Integration section.

  9. Update the admin-configured login credentials for apps that use form-based authentication.

    See Adding a Form-Based Application.

    Tip! You can use CSV batch login update to update passwords for form-based authentication. See CSV Batch Login Update.

  10. Have your end-users update their passwords for the form-based authentication apps that they can edit, including personal apps.

    See Changing Usernames and Passwords for Form-Based Apps.

  11. Replace your RADIUS shared secrets.

    See Configuring the RADIUS Server Interface.

Erik Fullmer

Director of Marketing

Erik was raised in many places in a military family but has long since called Utah home. He spends free time in his garden, in the mountains with his dog, and skis…a lot. He is actively earning the necessary certifications and training to become a certified winter mountain guide.

Erik graduated from Utah Valley University in 2011 with a bachelor’s degree in Behavioral Science and a minor in Spanish. Additionally, being raised by a German mother, he spent a part of his childhood and also the beginning of his professional career in Germany where he worked as a Digital Strategist for adesta, a locally owned business in Darmstadt. Speaking three languages has opened up the world to him and influences the breadth of topics covered in his articles. He has always held an affinity for the world wide web and its workings, development, history and future.

Being a key player in the development of, and Director of Marketing for HelpCloud, he takes the content displayed and utilized on HelpCloud extremely seriously.

Photo of Erik Fullmer