When an employee leaves your organization, Toktra ensures their access to every LLM tool is revoked immediately — from OpenAI API keys to active agent connections on enrolled devices. This guide covers manual lockout from the dashboard, the automated Okta integration, HRIS-driven offboarding, and reviewing the audit record after the fact.Documentation Index
Fetch the complete documentation index at: https://docs.toktra.dev/llms.txt
Use this file to discover all available pages before exploring further.
Manual one-click lockout
The Emergency Lockout page lets an admin revoke a user’s LLM access in a single click, without waiting for HRIS or IdP automation.Find the employee
Locate the user by email in the table. Active employees show a green Active badge.
What happens during a lockout
When a lockout is triggered (manually or automatically), Toktra executes the following steps in order:Provider access revocation
Toktra calls provider admin APIs to revoke the user’s organization membership and any API access tied to their identity (OpenAI, Anthropic, and others connected to your account).
Device lock command
A signed lock command is sent to all enrolled devices belonging to the user. Each agent receives the command and immediately blocks outbound LLM connections.
Audit snapshot generation
Toktra generates a tamper-proof audit snapshot PDF containing:
- The user’s identity and lockout timestamp
- All LLM usage events in the 14-day pre-departure window
- The revocation confirmation from each provider
- A chain-of-custody record with RFC 3161 timestamps
Chain of custody
The audit snapshot is backed by a chain-of-custody record — an append-only, tamper-evident audit trail. Each node references its parent, creating an immutable directed acyclic graph. No record can be modified or deleted after it is written. RFC 3161 timestamps from a trusted timestamp authority (DigiCert) provide cryptographic non-repudiation for every entry. This means that even Toktra itself cannot retroactively alter what was recorded at the time of lockout.Reviewing the audit snapshot
After a lockout, you can access the audit snapshot to verify what was captured.Navigate to Legal or HRIS Offboarding
Go to Legal → Legal Holds (
LegalHoldPage) or call GET /v1/hris/offboarding/{snapshot_id} via the API.Okta integration: automatic lockout on deactivation
Toktra integrates with Okta to trigger lockouts automatically when a user is deactivated in your IdP. How it works:- Configure an Okta event hook to send
user.lifecycle.deactivateevents to the Toktra webhook endpoint provided in Settings → Integrations → Okta. - Toktra receives the webhook, verifies the HMAC-SHA256 signature, and initiates the lockout pipeline for the deactivated user.
- The full lockout sequence (provider revocation, device lock commands, audit snapshot) runs automatically.
The Okta webhook fires on user deactivation, not on user deletion. Deactivation is the recommended action in Okta for offboarding, as it preserves the user record in the IdP for audit purposes.
The webhook endpoint URL and signing secret are displayed in Settings → Integrations → Okta after you save the integration. Copy the signing secret into the Okta event hook configuration.
HRIS integration: automated detection of terminations
For organizations using Workday or BambooHR, Toktra can automatically detect employee terminations and trigger the offboarding pipeline without any manual dashboard action.Workday
Toktra polls the Workday REST API hourly. When a termination event is detected, the offboarding pipeline starts automatically. Configure the Workday integration atPUT /v1/hris/config:
BambooHR
Toktra receives termination events from BambooHR via webhook. The endpoint atPOST /v1/hris/webhook/bamboohr verifies the X-BambooHR-Signature HMAC-SHA256 header before processing.
Configure the BambooHR integration at PUT /v1/hris/config:
14-day pre-departure anomaly detection
Regardless of whether the lockout is triggered manually, via Okta, or via HRIS, Toktra runs a 14-day pre-departure anomaly detection window before generating the audit snapshot. Toktra analyzes the user’s LLM usage in the 14 days prior to the lockout date and flags:- Unusual spikes in token volume
- Access to models or providers not typically used by the employee
- Off-hours activity patterns
- Large data transfers to external LLM endpoints