SaaS Security
Onboard an Envoy App to SSPM
Table of Contents
Expand All
|
Collapse All
SaaS Security Docs
Onboard an Envoy App to SSPM
Connect an Envoy instance to SSPM to detect posture risks.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Data Security license:
|
For SSPM to detect posture risks in your Envoy instance, you must onboard your Envoy
instance to SSPM. Through the onboarding process, SSPM logs in to Envoy using
administrator account credentials. SSPM uses this account to scan your Envoy
instance for misconfigured settings. If there are misconfigured settings, SSPM
suggests a remediation action based on best practices.
SSPM gets access to your Envoy instance by using Okta SSO credentials that you
provide during the onboarding process. For this reason, your organization must be
using Okta as an identity provider. The Okta account must be configured for
multi-factor authentication (MFA) using one-time passcodes.
To onboard your Envoy instance, you complete the following actions:
Collect Information for Accessing Your Envoy Instance
To access your Envoy instance, SSPM requires the following information, which you
will specify during the onboarding process.
Item | Description |
---|---|
Username | An email address of an Okta user account.
Required Permissions: The user must be
assigned to the Global Admin role in Envoy. |
Password | The password for the Okta user account. |
Okta Subdomain | The Okta subdomain for your organization. The subdomain was included in the login URL that Okta assigned to your organization. |
MFA Secret Key | A key that is used to generate one-time passcodes for multi-factor authentication. |
As you complete the following steps, make note of the values of the items
described in the preceding table. You will need to enter these values during
onboarding to access your Envoy instance from SSPM.
- Identify the Okta user account that SSPM will use to access your Envoy instance. The user account must be assigned to the Global Admin role in Envoy. SSPM needs this administrator access to monitor your Envoy instance.Remember which account you will use to access your Envoy instance through Okta SSO authentication from SSPM. You will provide the login credentials to SSPM during the onboarding process.
Connect SSPM to Your Envoy Instance
By adding an Envoy app in SSPM, you enable SSPM to connect to your Envoy instance.- From the Add Application page (Posture SecurityApplicationsAdd Application ), click the Envoy tile.Under posture security instances, Add Instance or, if there is already an instance configured, Add New instance.Choose the option to Log in with Okta.Enter the user credentials, Okta domain, and MFA secret key for accessing your Envoy instance and Connect.