End-of-Life (EoL)
Integrate with Azure Active Directory via SAML 2.0 federation
Many organizations use SAML to authenticate users for web services.
Prisma Cloud supports the SAML 2.0 federation protocol to access Prisma Cloud Console.
When SAML support is enabled, users can log into Console with their federated credentials.
This article provides detailed steps for federating your Prisma Cloud Console with your Azure Active Directory (AAD) tenant’s Identity Provider (IdP).
The Prisma Cloud/Azure Active Directory SAML federation flow works as follows:
- Users browse to Prisma Cloud Console.
- Their browsers are redirected to the AAD SAML 2.0 endpoint.
- They enter their AAD credentials to authenticate. Multi-factor authentication can be enforced at this step.
- An AAD SAML token is returned to Prisma Cloud Console.
- Prisma Cloud Console validates the Azure Active Directory SAML token’s signature and associates the user to their Prisma Cloud account via user identity mapping or group membership. Prisma Cloud supports SAML groups for Azure Active Directory federation.
The Azure Portal may change the Enterprise Application SAML federation workflow over time.
The concepts and steps outlined in this document can be applied to any Non-gallery application.
The Prisma Cloud Console is integrated with Azure Active Directory as a federated SAML Enterprise Application.
The steps to set up the integration are:
Configure Azure Active Directory
Configure Azure Active Directory.
Prerequisites:
- Required Azure Active Directory SKU: Premium
- Required Azure Active Directory role: Global Administrator
- Log onto your Azure Active Directory tenant (https://portal.azure.com).
- On the top left of the window pane, click+ New Application.
- SelectNon-gallery application, from the Add your own app section.
- Section #1 Basic SAML Configuration:
- Identifier:jdong-console(Set to your Console’s unique Audience value. You will configure this value within your Console at a later step.)
- Reply URL:https://<FQDN_of_your_Prisma Cloud_Console>:8083/api/v1/authenticate.
- Section #2 User Attributes & Claims:Select the Azure AD user attribute that will be used as the user account name within Prisma Cloud. This will be the NameID claim within the SAML response token. We recommend using the default value.
- Unique User Identifier (Name ID):user.userprincipalname [nameid-format:emailAddress]Even if you are using AAD Groups to assign access to Prisma Cloud set this value.
- Section #3 SAML Signing Certificate:
- SelectDownload: Certificate (Base64)
- Select the Pen icon.
- Set Signing Option:Sign SAML Response and Asertion
- Section #4 Set up jdong_console:Save the value of of Login URL and Azure AD Identifier. We will use these later for configuration in the Prisma Cloud Console.
- Copy the Application ID. You can find this going to Properties tab in the Manage section of the application.
- Click on Users and Groups within the Manage section of the application. Add the users and/or groups that will have the right to authenticate to Prisma Cloud Console.
Prisma Cloud User to AAD User Identity mapping
If you plan to map Azure Active Directory users to Prisma Cloud accounts go to Configure Prisma Cloud Console.
Prisma Cloud Groups to AAD Group mapping
When you use Azure Active Directory Groups to map to Prisma Cloud SAML Group, do not create users in Prisma Cloud Console.
Configure the AAD SAML application to send AAD group membership (http://schemas.microsoft.com/ws/2008/06/identity/claims/groups) claims within the SAML response token.
If you enable AAD Group authentication the Prisma Cloud User to AAD User Identity method of authentication will be ignored.
- Set Application permissions:
- Under the Manage section, go to API Permissions
- Click onAdd a Permission
- Click onMicrosoft Graph
- Select permissions:Application Permissions: Application.Read.All
- Click Add Permissions
- Click Grant admin consent for Default Directory within the Configured permissions blade.
- Create Application Secret
- Under the Manage section, go to Certificates & secrets
- Click onNew Client secret
- Add a secret description
- Expires:Never
- Click Add
- Make sure to save the secret value that is generated before closing the blade.
- Configure the application to send group claims within the SAML response token.You can configure this setting either within the Azure portal or via powershell.
- Azure AD Portal:
- ClickManifest
- Set"groupMembershipClaims": "SecurityGroup"
- ClickSave
- Powershell:
- Run the following powershell commands:import-module AzureAD Connect-AzureAD $twistlock = Get-AzureADApplication | where-object {$_.DisplayName -eq "jdong-console"} $oid = $twistlock.ObjectId Set-AzureADApplication -ObjectID $oid -GroupMembershipClaims 1Confirm that the GroupMembershipClaims has been set to SecurityGroup$twistlock = Get-AzureADApplication | where-object {$_.DisplayName -eq "jdong-console"} $twistlock.GroupMembershipClaimsAllow several minutes for these permissions to propagate within AAD.
- Log into Prisma Cloud Console as an administrator.
- Go toManage > Authentication > Identity Providers > SAML.
- SetIntegrate SAML users and groups with Prisma CloudtoEnabled.
- SetIdentity ProvidertoAzure.
- InIdentity provider single sign-on URL, enter the Azure AD providedLogin URL.
- InIdentity provider issuer, enter the Azure AD providedAzure AD Identifier.
- InAudience, enterjdong-console.
- InApplication ID, enterjdong-console’s AAD Application ID.
- InTenant ID, enterAAD tenant ID that contains the jdong-console application.
- InApplication Secretenterjdong-console application keys(only required if using AAD Groups).
- InX.509 certificate, paste the Azure AD SAMLSigning Certificate Base64into this field.
- ClickSave
- Go toManage > Authentication > Users.
- ClickAdd user.
- Create a New User.
- Username: Azure Active Directory userprincipalname
- Auth Method: SelectSAML
- Role: Select the appropriate role for the user
- ClickSave.
- Test logging into Prisma Cloud Console via Azure Active Directory SAML federation.Leave your existing session logged onto Prisma Cloud Console in case you encounter issues. Open a new in-private browser and go tohttps://<FQDN_of_your_Prisma Cloud_Console>:8083.
- Go toManage > Authentication > Groups.
- ClickAdd Group.
- Enter the display name of the AAD group.
- Click theSAML groupradio button.
- Select the Prisma Cloud role for the group.
- ClickSaveAzure Active Directory SAML response will send the user’s group membership as OIDs and not the name of the group. When a group is added, Prisma Cloud Console will query the Microsoft Azure endpoints to determine the OID of the group entered. Ensure your Prisma Cloud Console is able to reach https://login.windows.net/ and https://graph.windows.net
- Test logging into Prisma Cloud Console via Azure Active Directory SAML federation.Leave your existing session logged into Prisma Cloud Console in case you encounter issues. Open a new incognito browser window and go tohttps://<CONSOLE>:8083.
Configure Prisma Cloud Console
Configure Prisma Cloud Console.
Prisma Cloud User to AAD User Identity mapping
If you plan to map Azure Active Directory users to Prisma Cloud accounts perform the following steps.
Prisma Cloud Groups to AAD Group mapping
When you use AAD Groups to assign roles within Prisma Cloud you do not have to create a corresponding Prisma Cloud account.