Prisma Access Browser
Account Protection for the Prisma Access Browser
Table of Contents
Expand All
|
Collapse All
Prisma Access Browser Docs
-
- Use the Prisma Access Browser Dashboards
- Digest Prisma Access Browser Home Screen Highlights
- Investigate Prisma Access Browser Events
- Account Protection for the Prisma Access Browser
- Manage Prisma Access Browser Users
- Manage Prisma Access Browser Applications
- Manage Prisma Access Browser Extensions
- Manage Prisma Access Browser Sign-in Rules
- Manage Prisma Access Browser Requests to Bypass Policy Rules
- Manage Rollback Control for the Prisma Access Browser
- Prisma Access Browser Remote Connections
- Location-based Policy
- The Prisma Access Browser Extension
-
- Integrate Prisma Access Browser with Microsoft 365
- Integrate Prisma Access Browser with Microsoft Information Protection
- Windows Account Based SSO Authentication
- Integrate Prisma Access Browser with Google Workspace
- Integrate Prisma Access Browser with Votiro
- Integrate Prisma Access Browser with CrowdStrike Falcon Intelligence
- Integrate Prisma Access Browser with OPSWAT MetaDefender
- Integrate Prisma Access Browser with YazamTech SelectorIT
- Integrate Prisma Access Browser with Symantec DLP
- IP Based Enforcement
- Certificate-Based Enforcement
- How Is Synched Data Stored?
Account Protection for the Prisma Access Browser
This article describes how to perform the Account Protection deployment.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Many applications can’t integrate with a company’s Single Sign-On (SSO)
solution via an Identity Provider (IdP), such as Okta or Azure Active Directory
(AAD), despite handling sensitive data or enabling critical operations that impact
the organization. Examples of such applications include:
- Virtual Data Rooms (VDRs): Platforms for collaborating on contracts and documents between financial institutions.
- Company Social Media Accounts: Company social network accounts managed by marketing teams.
- Third-Party or Partner-Managed Applications: Services like secure file shares operated by external partners or vendors.
Organizations encounter significant challenges in achieving visibility and securing
these unmanaged services, leading to vulnerabilities caused by:
- Lack of Security Oversight: Applications not managed through an IdP often lack IT governance, creating uncertainties for security teams.
- Weak Access Controls: These services typically don’t support SSO integration or centralized authorization systems. Credential sharing is common, and multi-factor authentication (MFA) is frequently absent.
- Limited Security Measures: Without auditing and enforcement capabilities, these systems lack transparency and control over user access.
- Inadequate Data Protection: Security teams are unable to enforce stringent identity and data protection policies.
In many cases, users independently create, manage, and modify credentials
for such applications, or rely on third-party IT teams to handle security —
introducing significant risks.
Account Protection provides a solution by enabling security teams to regain
control over unmanaged, third-party, and non-SSO-enabled services. It achieves this
by ensuring all access occurs through a Privileged Access Broker (PAB), delivering:
- Gain full visibility into user actions within these systems.
- Record sessions and events for compliance and audit.
- Apply advanced data loss prevention (DLP) controls to protect sensitive data.
- Implement modern step-up MFA for applications that don’t support SSO.
By deploying Account Protection, organizations eliminate security gaps,
enhance oversight, and protect critical assets across all applications — whether
managed within the company’s SSO framework or not.
How Does It Work>

AAccount
Protection introduces an additional security layer for unmanaged
services by enhancing password management through the Protected Access Broker
(PAB). The process is as follows:
- Password creation / reset via PAB:
- Users must create or reset their passwords exclusively through the PAB.
- Without resetting the password via PAB, users can’t log in to the application through the enterprise browser.
- Secure password generation:
- PAB employs a proprietary algorithm to generate a secure
password by combining:
- User-Selected Password: A password chosen by the user, which is never stored in PAB.
- Secret Token: A unique, system-generated token created by PAB, which is not disclosed to the user.
- PAB employs a proprietary algorithm to generate a secure
password by combining:
- Password Swapping:
- PAB replaces the user-selected password with the combined secure password.
- The combined password is then set as the new application password during the password reset process.
Key Benefits
- Users retain knowledge only of their selected password, while the Prisma Access Browser (PAB) securely stores and appends the secret token during authentication.
- On subsequent logins,Prisma Access Browser appends its secure token to the user password, ensuring authentication success.
- Access Restriction: Logins from non-enterprise browsers are blocked because the secure token is absent, ensuring that access is limited to the enterprise browser environment.§
Administrative Control
You can enforce Prisma Access
Browser policy rules, including visibility and security measures, for unmanaged,
third-party, and non-SSO-enabled services.
- Supported Login Methods: Only password-based authentication methods are supported.
- Password Reset Requirement: The application must support resetting user passwords before login (e.g., via a "Forgot Password" feature).
- Shared Account Handling: For shared accounts, the same secure token is applied for all users. This configuration must be explicitly selected when enabling Account Protection for such applications.
This process ensures stronger security for unmanaged services while
maintaining usability and control.
Configure the Account Protection
Account Protection uses an Access & Data Control rule for configuration.
You can set up Account Protection in the Login Controls step.
To configure Account Protection:
- Create an Access & Data Control rule. For more information, refer to Manage Prisma Access Browser Access & Data Control Rules.
- Configure the Login Controls.
- Navigate to the Login Control step and do the following:
- Click "Login Form" to define login behavior.
- Select the desired Login Control behavior from the available options.
- Enable Account Protection:
- Click Account Protection to enforce access restrictions and secure application passwords.
- Check Activate Account Protection to
enable the feature.
- If shared accounts need to be supported, check
Enable Account Protection for shared
accounts to allow Prisma Access Browser to use
the same secret token for all users of the
application.
- Click "Login Form" to define login behavior.
- Navigate to the Login Control step and do the following:
- Finalize configuration:
- Once configured, users will only be able to access the protected application via the Prisma Access Browser.
- Users will need to reset their password for the application,
which will then be secured by Account Protection.
- For shared accounts, the same secret token will be applied to all users, enabling account sharing securely.
End-User Experience
- First-Time Login:
- When Account Protection is enabled, users attempting to log in to a protected application for the first time will receive a prompt to reset their password or create an account.
- The account will automatically be added to Account Protection upon password reset or account creation.
- Access Restriction Before Password Reset:
- Users can’t log in to the application until they reset their password via PAB.
- Visual Indications:
- A dedicated browser omnibox indicator will show that Account Protection is active.
- For some applications, additional indicators will appear during login attempts, offering guidance if login fails or when using a protected account.
By configuring Account Protection, administrators ensure enhanced security for unmanaged services, allowing only secure access through the Prisma Access Browser.