Skip to main content

Cyware Threat Intelligence eXchange

Set Up SAML SSO Integration using Okta

On Cyware Products, you can enable single sign-on (SSO) using an Identity Provider (IdP) that supports Security Assertion Markup Language (SAML), such as Okta.

To authenticate users using SAML SSO, follow these steps.

Create Custom Attributes in Okta

You can create custom attributes to use in the SAML assertion.

Steps

To create custom attributes, follow these steps:

  1. Sign in to Okta as an Administrator.

  2. Click the Okta User Profile to view the list of all the Base and Custom attributes.

  3. Click Add Attribute to add a new custom attribute. The Firstname, Lastname, and Email attributes are available as base attributes. Use the following details to add custom attributes.

    1. Data Type: Select data type as string.

    2. Display Name: Provide a display name for the custom attributes. For example, User Group Mapping.

    3. Variable Name: Provide a variable name for the custom attribute. For example, if you are creating a custom attribute to create a mapping between SAML groups, the variable name can be memberOf.

  4. Click Save.

Fetch Assertion URL and Entity ID from Cyware Product

Fetch the Assertion Consumer URL and entity ID from the Cyware product and have them handy.

Steps

  1. Login to the Cyware application.

  2. Navigate to Administration > Configuration > Authentication > SAML 2.0. If you are a Collaborate (CSAP) user, navigate to Management > Integrations > Authentication Methods > SAML 2.0.

  3. Copy these values. You need these values while setting up the SAML 2.0 app in Okta.

    • Assertion Consumer URL

    • Entity ID

    fetch_assertion_URL.png

Configure SAML 2.0 App for Cyware Product on Okta

On Okta, you have to set up a SAML 2.0 application for the Cyware products and generate a Single sign-on URL and certificate.

Steps

  1. Sign in to Okta as an Administrator.

  2. From the main hamburger menu, click Applications.

  3. Click Create App Integration.

  4. Select SAML 2.0 and click Next.

  5. On General Settings, use these values and click Next.

    • App Name - Cyware SSO app

    • App Logo - Use Product logo

    • App Visibility - Do not check these options

    general_settings_okta.png
  6. To Configure SAML, Enter the Assertion consumer URL you copied from the Cyware product into the Sign On URL.

  7. For Audience URL - Use the Entity ID displayed on the SAML 2.0 page that you copied.

  8. Select Name ID format as Persistent and Application username as Okta username. The value for the Name ID format must be set to persistent so that your IdP sends the same unique value for the NameID element in all SAML requests from a particular user. If you set it to anything else, the user will have a different saml: sub value for each session, and is not secure.

    SAML_settings_on_okta_new.png
  9. For Advanced Section, select Response as Unsigned, Assertion Signature as Signed, Assertion Encryption as UnEncrypted. These options ensure that the SAML authentication message is digitally signed by the IDP, and it restricts login to the SAML app only from browsers that have the signed certificate.

  10. In the Attribute Statements (Optional) section, enter the Name, Name Format, and Values for the following attributes

    • Email Address

      • Name - email

      • Name Format - Unspecified

      • Value - user.email

    • First Name

      • Name - first_name

      • Name Format - Unspecified

      • Value - user.firstName

    • Last Name

      • Name - last_name

      • Name Format - Unspecified

      • Value - user.lastName

    • User Group Mapping

      • Name - memberOf

      • Name Format - Unspecified

      • Value - user.memberOf

  11. Select Next.

  12. Select I'm a software vendor. I'd like to integrate my app with Okta and click Finish. You have now successfully created an application for the SAML integration. This application will have the details of the IdP URL and Certificate which you’ll need to add to the Cyware product to complete the SSO integration. This application will have the details of the IdP URL and Certificate which you’ll need to add to the Cyware product to complete the SSO integration.

  13. On Okta, you can find the Identity Provider SSO details at Applications > Sign On > View Setup Instructions.

    View_setup_instructions_on_Okta.png
  14. Download the identity provider metadata in the form of an .XML file. You should upload this XML into the Cyware product while configuring SAML.

  15. Have the following values from Okta handy to enter into the Cyware product while configuring SAML.

    • Identity Provider Single Sign On URL

    • X.509 certificate

    IDP_data_from_Okta.png

Configure SAML for Okta on Cyware Product

Configure SAML for Okta on the Cyware product by completing the following steps.

Steps

  1. Sign in to the Cyware product.

  2. Navigate to Administration > Configuration > Authentication > SAML 2.0. If you are a Collaborate (CSAP) user, navigate to Management > Integrations > Authentication Methods > SAML 2.0.

  3. Select SAML 2.0 and click Edit.

  4. Enter the values from Okta in the IDP (Identity Provider) section.

  5. Select metadata.xml to upload the metadata.xml from Okta.

  6. Click Certificate to enter the SSO URL. It is the Identity Provider Single Sign-on URL that you get from Okta.

  7. In IDP Certificate add the Okta .509 certificate.

  8. Set these options to false (do not enable).

    • Encrypt

    • AuthnRequest

  9. Click Save.

  10. Click Activate SAML.

Assign Values to your Custom Attributes

After configuring the Okta app, you can map custom attribute values to users.

Steps

To map Okta users with custom attribute values, follow these steps.

  1. Sign in to Okta as an Administrator.

  2. From the main hamburger menu, click Directory and select People.

  3. Select the required user and click Profile.

  4. Click Edit to provide values to the available attributes. You can add multiple values as comma-separated list without space after the comma. You can use the values provided for the custom attributes to associate with Cyware application user groups.

    For example, if you assign usergroup1 to the memberOf attribute, you can use the same value in the SAML Group Mapping field while creating user groups in the Cyware application.

  5. Click Save.