Streamline Your Security with Cortex XDR: Okta SSO
Table of Contents
- Introduction
- Prerequisites
- Configuration of Cortex XDR SSO with Octa as the Identity Provider (IDP)
- Group mapping
- Setting up Single Sign-On in Cortex XDR 3.4
- Using Octa as the IDP
- Configuring the Octa App Integration
- Attribute statements for user information
- Group attribute statements for role-Based access control
- Completing the SAML setup instructions in Cortex XDR
- Mapping attributes in Cortex XDR
- Assigning users and groups in Octa
- Testing the SSO integration
- Automatic role assignment using group mapping
- Troubleshooting SAML-based SSO configuration
Introduction
In this article, we will explore the single sign-on (SSO) feature in the Cortex XDR tenant. Single sign-on allows users to log in to the Cortex XDR instance using their organization's SSO process, streamlining the login experience and reducing the number of credentials required to access the console. We will provide step-by-step instructions for configuring SSO with Octa as the identity provider (IDP) and cover group mapping for role-based access control. Before we begin, let's ensure we have the necessary prerequisites in place.
Prerequisites
Before proceeding with the SSO configuration, make sure You have the following:
- Cortex XDR account admin or instance administrator credentials.
- Login access to your Cortex XDR instance.
- An active Octa instance as your chosen IDP.
Now that we have the prerequisites, let's dive into the configuration process.
Configuration of Cortex XDR SSO with Octa as the Identity Provider (IDP)
To set up SSO with Octa as the IDP in Cortex XDR, follow these steps:
- Log in to your Cortex XDR instance using your CSB credentials with an account that has either the XDR account admin or instance administrator role.
- Navigate to "Settings" and select "Configurations".
- Scroll down to the bottom and enable "Single Sign-On" by toggling the button.
- Once enabled, you will see the configuration options.
Group Mapping
Group mapping allows for role-based access control in Cortex XDR. By mapping groups in Octa to roles in Cortex XDR, users can be automatically assigned roles based on their group membership. To set up group mapping, follow these steps:
- Create a group in Cortex XDR by going to "Settings", "Configurations", "User Groups", and clicking "New Group".
- Give the group a descriptive name and select a role for the group.
- Specify the SAML group mapping group that you will use. For example, use "Cortex Administrators" as the group name and click "Create".
- Create the corresponding group in Octa under "Directory" and "Groups".
- Assign users to the group in Octa.
- Configure the group mapping in the Cortex XDR SAML application settings.
- Test the SSO integration with a user assigned to the group to verify the appropriate role assignment.
Setting up Single Sign-On in Cortex XDR 3.4
Starting with Cortex XDR 3.4, administrators can set up their Cortex XDR instances to use their organization's IDP for SAML-based single sign-on. Users will then have the ability to log in using their organization's SSO process to access the console. Here's how to enable SSO in Cortex XDR:
- Log in to your Cortex XDR instance using your CSB credentials with an account that has either the XDR account admin or instance administrator role.
- Go to "Settings", "Configurations", and scroll down to the bottom.
- Select "Single Sign-On" and toggle the button to reveal the configuration options.
- Configure the necessary settings based on your IDP's requirements.
Using Octa as the IDP
For the purpose of this article, we will be using Octa as the IDP. However, the concepts discussed here can be applied to other IDPs with slight variations. Let's proceed with Octa as the IDP and configure the app integration.
Configuring the Octa App Integration
To configure the Octa app integration in Cortex XDR, follow these steps:
- Log into the admin portal for your Octa instance and go to "Applications".
- Select "Create App Integration" and choose SAML 2.0 as the sign-in method.
- Provide an app name and optionally add an app logo.
- Follow the Prompts to complete the Octa app configuration, providing the necessary attributes and values.
- Once configured, obtain the metadata containing the Identity Provider Single Sign-On URL, Identity Provider Issuer, and the X.509 certificate.
Attribute Statements for User Information
Attribute statements define the user information that will be passed from Octa to Cortex XDR during the SSO process. In this section, we will define the attribute statements for the user's first name, last name, and email address.
Group Attribute Statements for Role-based Access Control
Group attribute statements allow for role-based access control by mapping Octa groups to roles in Cortex XDR. This enables users to be assigned roles in Cortex XDR automatically based on their group membership. For example, mapping Octa groups like "Viewer" or "Administrator" to corresponding roles in Cortex XDR.
Completing the SAML Setup Instructions in Cortex XDR
To complete the SAML setup instructions in Cortex XDR, follow these steps:
- Paste the values obtained from the Octa configuration (Identity Provider Single Sign-On URL, Identity Provider Issuer, and X.509 certificate) into the corresponding fields in Cortex XDR.
- Verify the attributes are correctly mapped by previewing the SAML assertion in Cortex XDR.
- If the attributes are mapped correctly, proceed with the setup by clicking "Next".
- Specify your feedback, select the appropriate options, and click "Finish".
Mapping Attributes in Cortex XDR
In this step, we will configure the attribute mappings in Cortex XDR based on the values filled in during the Octa configuration. We will map attributes like given name, surname, email address, and groups using Cortex XDR's attribute mapping feature.
Assigning Users and Groups in Octa
To assign users and groups in Octa, follow these steps:
- Go to the Octa application created for the Cortex XDR integration.
- Click the "Assignments" tab and assign users or groups as needed.
- Ensure at least one user is assigned to the application for testing the SSO integration.
Testing the SSO Integration
To test the SSO integration, follow these steps:
- Open a new incognito window in your browser.
- Visit your Cortex XDR tenant login page, accessible at "your-tenant-name.xdr-networks.com".
- If redirected to the customer support portal, check the SSO configuration in your Cortex XDR tenant and save the changes.
- Click on "Single Sign-On with SSO" to be redirected to the Octa login page.
- Complete the Octa login process to test the integration.
- If the sign-in is successful, you will be redirected to the Cortex XDR instance and logged in.
Automatic Role Assignment Using Group Mapping
To enable automatic role assignment based on group membership, follow these steps:
- Create a group in Cortex XDR that corresponds to a group in Octa.
- Create the same group in Octa and assign users to the group.
- Configure the group mapping in the Cortex XDR SAML application settings, specifying the attribute for group mapping.
- Test the SSO login with a user assigned to the group to ensure the appropriate role is assigned based on group membership.
Troubleshooting SAML-Based SSO Configuration
Here are a few troubleshooting tips if you encounter issues while configuring SAML-based SSO:
- Verify that your email address in Octa matches your email address in Cortex XDR.
- Check if a role is being assigned during the login process, either through the default role in the Cortex XDR SSO configuration or via group mapping.
- Ensure that you are using valid attribute values and correctly configured URLs in both Cortex XDR and Octa for SSO.
- Double-check the attribute mappings and group mappings to avoid any mapping errors.
In conclusion, SSO is a powerful feature that simplifies access management and enhances the user login experience in Cortex XDR. By implementing SSO with Octa as the IDP and configuring group mapping, organizations can streamline access provisioning and improve security. Remember to follow the steps and guidelines provided in this article to successfully set up and test the SSO integration in your Cortex XDR instance.