1Password Logs
Panther supports pulling logs directly from 1Password
Overview
Panther fetches 1Password event logs via the 1Password Events API every one minute. Panther is specifically monitoring the following 1Password events:
Sign-in attempts from a user's 1Password account
Items in shared vaults that have been modified, accessed, or used
Audit events from the Activity Log
To set up 1Password as a log source in Panther, you'll need to generate an access token in your 1Password account, then configure the 1Password log source in Panther.
How to onboard 1Password logs to Panther
Step 1: Generate an Access Token in 1Password
Sign in to your 1Password account, then click Integrations in the sidebar.
Click Directory at the top of the page.
Scroll down to the "Events Reporting" section then click Panther.

Enter a System Name for the integration, then click Add Integration.
Enter a name for the bearer token and choose token expiration.
Select the event types your token will have access to:
Sign-in attempts
Select this option if you plan to ingest OnePassword.SignInAttempt events into Panther.
Item usage events
Select this option if you plan to ingest OnePassword.ItemUsage events into Panther.
Audit events
Select this option if you plan to ingest OnePassword.AuditEvent events into Panther.
Click Issue Token to generate the access token key.
For additional information on issuing or revoking 1Password bearer tokens, see 1Password's documentation.
Click Save in 1Password and choose which vault to save your token to.
Click View Integration Details to view the token.
You will need this token in the next steps.
Step 2: Create a new 1Password log source in Panther
In the left-hand navigation bar of your Panther Console, click Configure > Log Sources.
Click Create New.
Search for “1Password,” then click its tile.
In the slide-out panel, click Start Setup.
On the next screen, enter a name for the source e.g.
My 1Password logs.Click Setup.
On the Credentials page, fill in the form:
Paste the access token key from your 1Password account into the Access Token field.
Select the region and plan of your 1Password account.
Click Setup. You will be directed to a success screen:

You can optionally enable one or more Detection Packs.
The Trigger an alert when no events are processed setting defaults to YES. We recommend leaving this enabled, as you will be alerted if data stops flowing from the log source after a certain period of time. The timeframe is configurable, with a default of 24 hours.

Note: By default, 1Password logs do not contain human-readable values for objects such as vaults and login credentials. Please see our guide about using Lookup Tables to translate 1Password's Universally Unique Identifier (UUID) values into human-readable names.
Panther-Built Detections
See Panther's built in rules for 1Password in panther-analysis in Github.
Supported log types
OnePassword.ItemUsage
These are 1Password item usage events. For more information, see the 1Password Events API reference documentation.
OnePassword.SignInAttempt
These are 1Password sign-in attempts. For more information, see the 1Password Events API reference documentation.
OnePassword.AuditEvent
These are 1Password audit events from the Activity Log. For more information, see the 1Password Events Reporting audit events documentation.
Last updated
Was this helpful?

