End-of-Life (EoL)
Integrate with SAML
Prisma Cloud supports user authentication using SAML.
Many organizations use SAML to authenticate users for web services.
When SAML support is enabled, administrators can log into Console with their federated credentials.
They do not need to first set up a separate account in Prisma Cloud.
With SAML users and groups, admins can create granular access control rules that allow or deny specific actions against specific resources for specific users and groups.
For example, an administrator could create an access control rule called “Production read-only” that limits the SAML group “Test Team” to run just the docker ps, docker stats, and docker inspect commands on any host named prod*.
When this rule is activated, users that are part of the Test Team group can only run these Docker client commands on production hosts. All other commands are blocked.
Prisma Cloud’s internal processing for SAML access control rules is as follows:
- A user accesses Console.
- She is prompted to submit her credentials.
- The SAML authentication flow begins.
- Prisma Cloud gets a response from the SAML Identity provider that:
- Validates the user’s credentials.
- Lists her group memberships.
- The user is directed to the Console access page (/configure/access/certificates), and she is prompted to download her certificate. Group memberships for the user are embedded in the certificate.
- Using her certificate, the user runs a Docker client command on a host protected by Defender.
- Defender uses the certificate to determine the user’s identity and group memberships. Defender allows or blocks the command, depending on the access policies specified in Console.
Note that Defender does not talk to the SAML IdP.
Instead, it relies on the user certificate generated from the initial SAML authentication flow, when the user first tries to log into Console (see Step 1-5 above).
The validity period for the certificate is controlled by the SAML IdP, which embeds the login expiration into the response.
When Prisma Cloud is integrated with SAML, the logout button in Console works differently than expected.
When you log out, Prisma Cloud unregisters your token, but it does not log you out from your SAML provider (because users want to stay signed into their other apps).
Instead, the token is removed and you are redirected back to the login page, which automatically signs you back into Console (assuming that you are still logged into the SAML provider).
Logging out from Console, therefore, essentially refreshes your account information and group memberships.
Integrating with SAML
Integrating Prisma Cloud with SAML consists of setting up your IdP, then configuring Prisma Cloud to integrate with it.
In this article, we’ll use Okta as the IdP.
Setting up Prisma Cloud in Okta
To set up Prisma Cloud in Okta:
- Log into the Okta admin dashboard.
- On the right, clickAdd Applications.
- On the left, clickCreate new app.
- SelectSAML 2.0, and then clickCreate.
- In theApp namefield, enterPrisma Cloud Console, then clickNext.
- In the SAML Settings dialog:
- In theSingle Sign On URLfield, enterhttps://<CONSOLE_ADDR>:8083/api/v1/authenticate.Note that if you’ve changed the default port you use for the HTTPS listener, you’d need to adjust the URL here accordingly. Additionally, this URL must be visible from the Okta environment, so if you’re in a virtual network or behind a load balancer, it must be configured to forward traffic to this port and it’s address is what should be used here.
- SelectUse this for Recipient URL and Destination URL.
- In the field forAudience Restriction, entertwistlock(all lowercase).
- ExpandAdvanced Settings.
- Verify thatResponseis set toSigned.
- Verify thatAssertion Signatureis set toSigned.
- (Optional) Add a group.Setting up groups is optional. If you set up group attribute statements, then permission to access Prisma Cloud is assessed at the group level. If you don’t set up group attribute statements, them permission to access Prisma Cloud is assessed at the user level.
- Scroll down to theGROUP ATTRIBUTE STATEMENTSsection.
- In theNamefield, entergroups.
- In filter drop down menu, selectRegexand enter a regular expression that captures all the groups defined in Okta that you want to use for access control rules in Prisma Cloud.In this example, the regular expression.*(t|T)wistlock.*is used to include all groups prepended with either Prisma Cloud or twistlock. You should enter your own desired group name here. If you have just one group, such as YourGroup, then just enterYourGroup. Regular expressions are not required. If you have multiple groups, you can use a regular expressions, such as(group1|group2|group3).
- ClickNext, and then clickFinish.You are directed to a summary page for your new app.
- Click on thePeopletab, and add users to the Prisma Cloud app.
- Click on theGroupstab, and add groups to the Prisma Cloud app.
- Click on theSign Ontab and clickView setup instructions.The following values are used to configure Prisma Cloud Console, so copy them and set them aside.
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
Configuring Console
To configure Console:
- Open Console, and login as admin.
- Go toManage > Authentication > SAML.
- SetEnabledtoON.
- Copy the following values from Okta and paste them into their corresponding fields in Console:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
- ClickSave.Do NOT log out of Console after this step without creating access rules (following the procedure listed below). If you log out now you will be redirected to authenticate via SAML without having a group yet, causing the login to fail.
Granting access by group
Grant access to Prisma Cloud Console by group.
Each group must be assigned a role.
You can optionally use these groups to define RBAC rules for controlling who can run which Docker Engine commands in your environment.
- Open Console.
- Define a SAML group.
- Go toManage > Authentication > Groups.
- ClickAdd group.
- In theNamefield, enter a group name.The group name must exactly match the group name in the SAML IdP. Console does not verify if that the value entered matches a group name in the SAML IdP.
- Select theSAML groupcheckbox.
- Select a role.
- Select a project(s) - Optional.
- ClickSave.
Granting access by user
Grant access to Prisma Cloud Console by user.
Each user must be assigned a role.
You can optionally use these user to define RBAC rules for controlling who can run which Docker Engine commands in your environment.
- Open Console.
- Define a SAML user.
- Go toManage > Authentication > Users.
- ClickAdd user.
- In theUsernamefield, enter a user name.The username must exactly match the username in the SAML IdP. Console does not verify if that the value entered matches a user name in the SAML IdP.
- SelectSAMLas the Auth method
- Select a role.
- (Optional) Select a project(s).
- ClickSave.
Troubleshooting
If you misconfigure the SAML integration parameters in Prisma Cloud Console, you might get locked out from your Prisma Cloud admin account.
When you try to log into Console to fix the configuration, you might be redirected to the Okta login page.
Console has a back door that lets you log in with Prisma Cloud users, not SAML users.
An example of a Prisma Cloud user is the default admin account created when you first install Prisma Cloud.
To log in with a Prisma Cloud user account when SAML is enabled, add the URL fragment /#!/login to Console’s address.
For example:
https://<CONSOLE_IPADDR | HOSTNAME>:8083/#!/login
Regular SAML users should log in with the address to Console’s front page:
https://<CONSOLE_IPADDR | HOSTNAME>:8083
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.