SaaS Security
Onboard a Box App to SSPM
Table of Contents
Expand All
|
Collapse All
SaaS Security Docs
Onboard a Box App to SSPM
Connect a Box instance to SSPM to detect posture risks.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Data Security license:
|
To run scans of your Box instance, SSPM connects to the Box instance by using
information that you provide. Once SSPM connects, it scans the Box instance and will
continue to run scans at regular intervals.
Onboard a Box App to SSPM Using Login Credentials
Connect a Box instance to SSPM to detect posture risks.
For SSPM to detect posture risks in your Box instance, you must onboard your Box
instance to SSPM. Through the onboarding process, SSPM logs in to Box using
administrator account credentials. SSPM uses this account to scan your Box instance
for misconfigured settings. If there are misconfigured settings, SSPM suggests a
remediation action based on best practices.
During the onboarding process, you will supply Box account credentials to SSPM. SSPM
can access the account directly or through the Okta or Microsoft Azure identity
providers. Having SSPM access the account through one of these identity providers
requires MFA, which adds an extra layer of security.
To onboard your Box instance, you complete the following actions:
- Collect information for connecting to your box instance.To access your Box instance, SSPM requires the following information, which you will specify during the onboarding process.
Item Description Username The username of the administrator account. (Required Permissions) The user must be a Box administrator. At a minimum, the user must be a Co-Admin with permission to "View settings and apps for your company".Password The password for the administrator account. If you are logging in through Okta, you must provide SSPM with the following additional information:Item Description Okta subdomain The Okta subdomain for your organization. The subdomain was included in the login URL that Okta assigned to your organization. Okta 2FA secret A key that is used to generate one-time passcodes for MFA. If you are using Azure Active Directory (AD) as your identity provider, you must provide SSPM with the following additional information:Item Description Azure 2FA secret A key that is used to generate one-time passcodes for MFA. As you complete the following steps, make note of the values of the items described in the preceding tables. You will need to enter these values during onboarding to access your Box instance from SSPM.- Identify the administrator account that SSPM will use to access your Box instance. The user account must have administrator privileges in Box. At a minimum, the user must be a Co-Admin with permission to "View settings and apps for your company". SSPM needs this access to monitor your Box instance.Determine whether you want SSPM to log in to the administrator account directly, or through an identity provider.You can use Okta or Microsoft Azure as the identity provider for accessing the administrator account. However, if you use an identity provider, SSPM requires more information for MFA.
- (For Okta log in) To access the administrator account through Okta:
- (For Microsoft Azure log in) To access the administrator account through Microsoft Azure:
Connect SSPM to your Box instance.- Log in to Strata Cloud Manager.Select ManageConfigurationSaaS SecurityPosture SecurityApplicationsAdd Application and click the Box tile.On the Posture Security tab, Add New instance.Specify how you want SSPM to connect to your Box instance. SSPM can Log in with Credentials, Log in with Okta, or Log in with Azure.When prompted, provide SSPM with the administrator credentials. If SSPM is connecting to the account through an identity provider, specify the information that SSPM needs for MFA.Connect