End-of-Life (EoL)
Integrate with Okta via SAML 2.0 federation
Many organizations use SAML to authenticate users for web services.
Prisma Cloud supports the SAML 2.0 federation protocol to access the Prisma Cloud Console.
When SAML support is enabled, administrators can log into Console with their federated credentials.
This article provides detailed steps for federating your Prisma Cloud Console with Okta.
The Prisma Cloud/Okta SAML federation flow works as follows:
- Users browse to Prisma Cloud Console.
- Their browsers are redirected to the Okta SAML 2.0 endpoint.
- They enter their credentials to authenticate. Multi-factor authentication can be enforced at this step.
- A SAML token is returned to Prisma Cloud Console.
- Prisma Cloud Console validates the SAML token’s signature and associates the user to their Prisma Cloud account via user identity mapping or group membership.
Integrating Prisma Cloud with SAML consists of setting up your IdP, then configuring Prisma Cloud to integrate with it.
Setting up Prisma Cloud in Okta
Set up Prisma Cloud in Okta.
- Log into the Okta admin dashboard.
- On the right, clickAdd Applications.
- On the left, clickCreate new app.
- SelectSAML 2.0, and then clickCreate.
- In theApp namefield, enterPrisma Cloud Console, then clickNext.
- In the SAML Settings dialog:
- In theSingle Sign On URLfield, enterhttps://<CONSOLE_ADDR>:8083/api/v1/authenticate.Note that if you have changed the default port you use for the HTTPS listener, you’d need to adjust the URL here accordingly. Additionally, this URL must be visible from the Okta environment, so if you’re in a virtual network or behind a load balancer, it must be configured to forward traffic to this port and it’s address is what should be used here.
- SelectUse this for Recipient URL and Destination URL.
- In the field forAudience Restriction, entertwistlock(all lowercase).
- ExpandAdvanced Settings.
- Verify thatResponseis set toSigned.
- Verify thatAssertion Signatureis set toSigned.
- (Optional) Add a group.Setting up groups is optional. If you set up group attribute statements, then permission to access Prisma Cloud is assessed at the group level. If you don’t set up group attribute statements, them permission to access Prisma Cloud is assessed at the user level.
- Scroll down to theGROUP ATTRIBUTE STATEMENTSsection.
- In theNamefield, entergroups.
- In filter drop down menu, selectRegexand enter a regular expression that captures all the groups defined in Okta that you want to use for access control rules in Prisma Cloud.In this example, the regular expression.*(t|T)wistlock.*is used to include all groups prepended with either Prisma Cloud or twistlock. You should enter your own desired group name here. If you have just one group, such as YourGroup, then just enterYourGroup. Regular expressions are not required. If you have multiple groups, you can use a regular expressions, such as(group1|group2|group3).
- ClickNext, and then clickFinish.You are directed to a summary page for your new app.
- Click on thePeopletab, and add users to the Prisma Cloud app.
- Click on theGroupstab, and add groups to the Prisma Cloud app.
- Click on theSign Ontab and clickView setup instructions.The following values are used to configure Prisma Cloud Console, so copy them and set them aside.
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
Configuring Console
Configure Prisma Cloud Console.
- Open Console, and login as admin.
- Go toManage > Authentication > Identity Providers > SAML.
- SetIntegrate SAML users and groups with Prisma CloudtoEnabled.
- SetIdentity providertoOkta.
- Copy the following values from Okta and paste them into their corresponding fields in Console:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
- InAudience, entertwistlock.
- ClickSave.
Granting access by group
Grant access to Prisma Cloud Console by group.
Each group must be assigned a role.
You can optionally use these groups to define RBAC rules for controlling who can run which Docker Engine commands in your environment.
- Open Console.
- Define a SAML group.
- Go toManage > Authentication > Groups.
- ClickAdd group.
- In theNamefield, enter a group name.The group name must exactly match the group name in the SAML IdP. Console does not verify if that the value entered matches a group name in the SAML IdP.
- Select theSAML groupcheckbox.
- Select a role.
- Select a project(s) - Optional.
- ClickSave.
Granting access by user
Grant access to Prisma Cloud Console by user.
Each user must be assigned a role.
You can optionally use these user to define RBAC rules for controlling who can run which Docker Engine commands in your environment.
- Open Console.
- Define a SAML user.
- Go toManage > Authentication > Users.
- ClickAdd user.
- In theUsernamefield, enter a user name.The username must exactly match the username in the SAML IdP. Console does not verify if that the value entered matches a user name in the SAML IdP.
- SelectSAMLas the Auth method
- Select a role.
- (Optional) Select a project(s).
- ClickSave.