End-of-Life (EoL)
Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services via SAML 2.0 Federation
Many organizations use SAML to authenticate users for web services.
Prisma Cloud supports the SAML 2.0 federation protocol for access to the Prisma Cloud Console.
When SAML support is enabled, administrators can log into the Console with their federated credentials.
This article provides detailed steps for federating your Prisma Cloud Console with your Active Directory Federation Service (ADFS) Identity Provider (IdP).
Prisma Cloud supports SAML 2.0 federation with Windows Server 2016 and Windows Server 2012r2 Active Directory Federation Services via the SAML protocol.
The federated workflow is as follows:
- The user browses to the Prisma Cloud Console.
- The browser is redirected to ADFS SAML2.0 endpoint.
- The user authenticates either via Windows Integrated Authentication or Forms Based Authentication. Multi-factor authentication can be enforced at this step in the workflow.
- The ADFS SAML token is returned to the Prisma Cloud Console.
- The Prisma Cloud Console validates the ADFS SAML token’s signature and associates the user to their Prisma Cloud account.
Federation with Windows Server 2016 Active Directory Federation Services
The Prisma Cloud Console is integrated with ADFS as a federated SAML Relying Party Trust.
The Relying Party trust workflows may differ slightly between Windows Server 2016 and Windows Server 2012r2 ADFS, but the concepts are the same.
Configure Active Directory Federation Services
This guide assumes you have already deployed Active Directory Federation Services, and Active Directory is the claims provider for the service.
- Log onto your Active Directory Federation Services server.
- Go toServer Manager > Tools > AD FS Managementto start the ADFS snap-in.
- Go toAD FS > Service > Certificatesand click on thePrimary Token-signingcertificate.
- Select the Details tab, and clickCopy to File….
- Save the certificate as a Base-64 encoded X.509 (.CER) file. You will upload this certificate into the Prisma Cloud console in a later step.
- Go toAD FS > Relying Party Trusts.
- ClickAdd Relying Party Trustfrom theActionsmenu.
- Step Welcome: selectClaims aware.
- Step Select Data Source: selectEnter data about the relying party manually.
- Step Specify Display Name: InDisplay Name, entertwistlock Console.
- Step Configure Certificate: leave blank.
- Step Configure URL: selectEnable support for the SAML 2.0 WebSSO protocol. Enter the URL for your Prisma Cloud Consolehttps://<FQDN_TWISTLOCK_CONSOLE>:8083/api/v1/authenticate/.
- Step Configure Identifiers: for example entertwistlockall lower case and clickAdd.
- Step Choose Access Control Policy: this is where you can enforce multi-factor authentication for Prisma Cloud Console access. For this example, selectPermit everyone.
- Step Ready to Add Trust: no changes, clickNext.
- Step Finish: selectConfigure claims issuance policy for this applicationthen clickClose.
- In the Edit Claim Issuance Policy for Prisma Cloud Console clickAdd Rule.
- Step Choose Rule Type: InClaim rule template, selectSend LDAP Attributes as Claims.
- Step Configure Claim Rule:
- SetClaim rule nametoPrisma Cloud Console
- SetAttribute StoretoActive Directory
- InMapping of LDAP attributes to outgoing claim types, set theLDAP AttributetoSAM-Account-NameandOutgoing claim typetoName ID.The user’s Active Directory attribute returned in the claim must match the Prisma Cloud user’s name. In this example we are using the samAccountName attribute.
- ClickFinish.
- Configure ADFS to either sign the SAML response (-SamlResponseSignature MessageOnly) or the SAML response and assertion (-SamlResponseSignature MessageAndAssertion) for the Prisma Cloud Console relying party trust. For example to configure the ADFS to only sign the response, start an administrative PowerShell session and run the following command:set-adfsrelyingpartytrust -TargetName "Prisma Cloud Console" -SamlResponseSignature MessageOnly
Active Directory group membership within SAML response
You can use Active Directory group membership to assign users to Prisma Cloud roles.
When a user’s group membership is sent in the SAML response, Prisma Cloud attempts to associate the user’s group to a Prisma Cloud role.
If there is no group association, Prisma Cloud matches the user to an identity based on the NameID to Prisma Cloud username mapping.
The SAML group to Prisma Cloud role association does not require the creation of a Prisma Cloud user.
Therefore simplify the identity management required for your implementation of Prisma Cloud.
- InRelying Party Trusts, select thePrisma Cloud Consoletrust.
- ClickEdit Claim Issuance Policyin the right handActionspane.
- ClickAdd Rule.
- Claim rule template:Send Claims Using a Custom Rule.
- ClickNext.
- Claim rule name:Prisma Cloud Groups.
- Paste the following claim rule into the Custom rule field:c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"] => issue(store = "Active Directory", types = ("groups"), query = ";tokenGroups;{0}", param = c.Value);
Configure the Prisma Cloud Console
Configure the Prisma Cloud Console.
- Login to the Prisma Cloud Console as an administrator.
- Go toManage > Authentication > SAML.
- UnderSAML settings:
- Integrate SAML users and groups with Prisma Cloud:Enabled.
- Identity Provider:ADFS.
- Identity provider single sign-on URL: Enter your SAML Single Sign-On Service URL. For examplehttps://FQDN_of_your_adfs/adfs/ls.
- Identity provider issuer: Enter your SAML Entity ID, which can be retrieved fromADFS > Service > Federation Service Properties : Federation Service Identifier.
- Audience: Enter the ADFS Relying Party identifiertwistlock
- X.509 certificate: paste the ADFSToken Signing Certificate Base64into this field.
- ClickSave.
- Go toManage > Authentication > Users.
- ClickAdd user.
- Username: Active Directory samAccountName must match the value returned in SAML token’s Name ID attribute.When federating with ADFS Prisma Cloud usernames are case insensitive. All other federation IdPs are case sensitive.
- Auth method: set toSAML.
- Role: select an appropriate role.
- ClickSave.
Active Directory group membership mapping to Prisma Cloud role
Associate a user’s Active Directory group membership to a Prisma Cloud role.
- Go toManage > Authentication > Groups.
- ClickAdd group.
- Group Name matches theActive Directory group name.
- Select theSAML groupradio button.
- Assign theRole.The SAML group to Prisma Cloud role association does not require the creation of a Prisma Cloud user.
- Test login into the Prisma Cloud Console via ADFS SAML federation.Leave your existing session logged onto the Prisma Cloud Console in case you encounter issues. Open a new in-private browser and go to https://<FQDN_TWISTLOCK_CONSOLE>:8083.
Troubleshooting
There is a little trial and error when configuring federation.
If you misconfigure the SAML integration parameters in Prisma Cloud Console, you might get locked out from your Prisma Cloud admin account.
When you try to log into the Prisma Cloud Console to fix the configuration, you might be redirected to the ADFS login page.
The Prisma Cloud Console provides the ability to logon with a local database account when SAML integration is enabled.
An example of a Prisma Cloud user is the default admin account created when you first install Prisma Cloud.
To login with a Prisma Cloud user account when SAML is enabled, add the URL fragment /#!/login to Console’s address.
For example:
https://<CONSOLE_IPADDR | HOSTNAME>:8083/#!/login
Regular SAML users should log in with the address to Console’s front page:
https://<CONSOLE_IPADDR | HOSTNAME>:8083
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.