End-of-Life (EoL)
Integrate Prisma Cloud with Open ID Connect
OpenID Connect is an standard that extends OAuth 2.0 to add an identity layer.
Prisma Cloud supports integration with any standard Open ID Connect (OIDC) provider that implements both OpenID connect core and OpenID connect discovery.
Instructions for integrating with PingOne and Okta are shown here.
Prisma Cloud supports the authorization code flow only.
PingOne
Integrate with PingOne.
You need to configure Compute as an OIDC app.
When configuring your app:
- The Start SSO URL must point to https://<CONSOLE>:<PORT>/callback.
- The Redirect URI must point to https://<CONSOLE>:<PORT>/api/v1/authenticate/callback/oidc.
- UserInfo must include sub, idpid, name.
- All of the following scopes must be included for OpenID: OpenID Connect (openid), OpenID profile, OpenID Email, OpenID address, OpenID Phone, Groups.
Update Ping callback URL
Update the callback URL.
- Log into the Ping web portal.
- ClickApplications, and then click theOIDCtab.
- Click on the arrow button nest for your app.
- Click on the pencil icon on the right side.
- Click onAuthentication Flow.
- InREDIRECT URIS, enter the callback URL:https://<CONSOLE>:<PORT>/api/v1/authenticate/callback/oidc.
Create new user and join to group
- In the Ping web portal, clickUsers, and then click theUserstab.
- ClickAdd users, and choose theCreate New Useroption.
- Fill the fields forPassword,Username(should be your email),First Name,Last Name, andEmail.
- In theMembershipfield, clickAdd, and choose a group.
- ClickSave.
Okta
Integrate with Okta.
- Initiate Login URI (Okta) must point to https://<CONSOLE>:<PORT>/callback.
- Redirect URI must point to https://<CONSOLE>:<PORT>/api/v1/authenticate/callback/oidc.
- UserInfo must include sub, idpid, name.
- Scopes:
- All of the following scopes must be included for OpenID: OpenID Connect (openid), OpenID profile, OpenID Email, OpenID address, OpenID Phone, Groups.
- All of the following scopes must be included for Okta: okta.groups.manage, okta.groups.read.
Update Okta callback URL
Update the callback URL.
- Log into Okta.
- Click onApplicationsand click on your application.
- Click theGeneraltab, and then clickEdit.
- UpdateLogin redirect URIs. Enter the following callback URL:https://<CONSOLE>:<PORT>/api/v1/authenticate/callback/oidc, and then clickSave.
Configure Prisma Cloud
Configure Prisma Cloud.
- Log into Prisma Cloud Console.
- Go toManage > Authentication > Identity Providers > OpenID Connect.
- Enable OpenID Connect.
- Fill in the settings.
- ForClient ID, enter the client ID.
- ForClient Secret, enter the client secret.
- ForIssuer URL, enter:https://sso.connect.pingidentity.com/<CLIENT_ID>.
- ForGroup scope, selectgroups.
- (Optional) Enter your certificate.
- ClickSave.
Prisma Cloud to OIDC user identity mapping
Create a Prisma Cloud user for every user that should have access to Prisma Cloud.
Prisma Cloud uses the sub attribute that comes from OIDC to match the username configured in the Prisma Cloud database (as required by the OIDC spec).
Whichever value the provider is configured to send to Prisma Cloud should be used to configure users.
- Go toManage > Authentication > Users.
- ClickAdd User.
- SetUsernameto the GitHub user name.
- SetAuth methodtoOpenID Connect.
- Select a role for the user.
- ClickSave.
- Test logging into Prisma Cloud Console.
- Logout of Prisma Cloud.
- On the login page, selectOpenID Connect, and then clickLogin.
- You’re redirected to your OIDC provider to authenticate.
- After successfully authenticating, you’re logged into Prisma Cloud Console.
Prisma Cloud to OIDC provider group mapping
When you use groups to assign roles in Prisma Cloud you don’t have to create individual Prisma Cloud accounts for each user.
The group value configured on the Compute side should reflect the name of the group scope in the OIDC provider.
It might be something different than groups.
Groups can be associated and authenticated with by multiple identity providers.
- Go toManage > Authentication > Groups.
- ClickAdd Group.
- InName, enter an OpenShift group name.
- InAuthentication method, selectExternal Providers.
- InAuthentication Providers, selectOpenID Connect group.
- Select a role for the members of the group.
- ClickSave.
- Test logging into Prisma Cloud Console.
- Logout of Prisma Cloud.
- On the login page, selectOpenID Connect, and then clickLogin.
- You’re redirected to your OIDC provider to authenticate.
- After successfully authenticating, you’re logged into Prisma Cloud Console.