SaaS Security
Onboard a MuleSoft App to SSPM
Table of Contents
Expand All
|
Collapse All
SaaS Security Docs
Onboard a MuleSoft App to SSPM
Connect a MuleSoft instance to SSPM to detect posture risks.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Data Security license:
|
For SSPM to detect posture risks in your MuleSoft instance, you must onboard your
MuleSoft instance to SSPM. Through the onboarding process, SSPM logs in to MuleSoft
using administrator account credentials. SSPM uses this account to scan your
MuleSoft instance for misconfigured settings. If there are misconfigured settings,
SSPM suggests a remediation action based on best practices.
SSPM gets access to your MuleSoft instance by using Okta SSO or Microsoft Azure
credentials that you provide during the onboarding process. For this reason, your
organization must be using Okta or Microsoft Azure as an identity provider. The Okta
or Microsoft Azure account must be configured for multi-factor authentication (MFA)
using one-time passcodes.
To onboard your MuleSoft instance, you complete the following actions:
- Collect information for accessing your MuleSoft instance.To access your MuleSoft instance, SSPM requires the following information, which you will specify during the onboarding process.
Item Description User The login email address of the MuleSoft user account that SSPM will use to access your MuleSoft instance. Required Permissions: The user must be an organization owner or organization administrator for the MuleSoft Anypoint Platform.Password The password for the login account. Organization Domain Name The name of the domain in the MuleSoft Anypoint Platform that is associated with your organization. If you're logging in through Okta, you must provide SSPM with the following additional information:Item Description Okta subdomain The Okta subdomain for your organization. The subdomain was included in the login URL that Okta assigned to your organization. Okta 2FA secret A key that is used to generate one-time passcodes for MFA. If you're using Azure Active Directory (AD) as your identity provider, you must provide SSPM with the following additional information:Item Description Azure 2FA secret A key that is used to generate one-time passcodes for MFA. As you complete the following steps, make note of the values of the items described in the preceding table. You will need to enter these values during onboarding to access your MuleSoft instance from SSPM.- Identify the MuleSoft user account that SSPM will use to access your MuleSoft instance.(Required Permissions) The user must be an organization owner or organization administrator for the MuleSoft Anypoint Platform. SSPM needs this level of access to monitor your MuleSoft instance.Get a secret key for MFA.The steps you follow to get the MFA secret key differs depending on the identity provider you're using to access the account.
- (For Okta log in) To access the account through Okta:
- (For Microsoft Azure log in) To access the account through Microsoft Azure:
Make note of your organization's domain name in the MuleSoft Anypoint Platform.You can navigate to your organization information from the Access Management page in the MuleSoft Anypoint Platform.- Log in to the MuleSoft Anypoint Platform.
- Click the menu icon in the top-left corner of the page and
select Access Management.
- On the Access Management page, select
Organization and then click on your
organization name.A dialog opens, displaying information about your organization.
- From the Organization info dialog, locate your organization name.
Remember your organization name. You will provide this information to SSPM during the onboarding process.Connect SSPM to your MuleSoft instance.- Log in to Strata Cloud Manager.Select ConfigurationSaaS SecurityPosture SecurityApplicationsAdd Application and click the MuleSoft tile.On the Posture Security tab, Add New instance.Specify how you want SSPM to connect to your MuleSoft instance. SSPM can Log in with Okta or Log in with Azure.When prompted, provide SSPM with the login credentials, your organization domain name, and the information it needs for MFA.Connect.