SAML Setup
General
Cloud Defense supports SP-initiated SAML 2.0 SSO. Once setup is complete, you can start this flow from the main login page by clicking on "Sign in with your corporate ID" and entering your corporate email domain on the subsequent page.
SAML Parameters
ACS URL (Assertion Consumer Service URL)
: https://auth.prod.disruptops.com/saml2/idpresponse
Entity ID
: urn:amazon:cognito:sp:us-west-2_sxsZbR4hW
Attribute mapping
You need to map the following attributes
- given_name
- family_name
Once your IdP is setup, you will need to communicate your metadata file or URL to Cloud Defense for completion.
Each user that is allowed to login with via your IdP will be granted read-only access to Cloud Defense the first time the access the app. This user will be assigned a unique username that includes the user's email.
Google Workspace-specific instructions
- Go to admin.google.com and select Apps | Web and mobile apps
- Click on Add app | Add custom SAML app
- Give your app a name and description
- Download the metadata, this will need to be communicated to Cloud Defense
- For
ACS URL
enter theACS URL
above - For
Entity ID
enter theEntity ID
above - Leave the rest default and select Continue
- Map the above attributes to the appropriate Google Directory attributes and select Finish
- Add users/groups to access for this application (Under
User Access
) - Send the metadata file to Cloud Defense
Okta-specific instructions
-
Go to your Okta account admin apps section: https://YOUR-ACCOUNT.okta.com/admin/apps/active
-
Click
Create App Integration
. -
Choose SAML 2.0, click
Next
. -
In
General Settings
:- Enter an App name, such as Cloud Defense.
- Check both
Do not display application icon
boxes. - Click
Next
.
-
In
Configure SAML
,General
section enter the following:Single sign on URL
: https://auth.prod.disruptops.com/saml2/idpresponseAudience URI
: urn:amazon:cognito:sp:us-west-2_sxsZbR4hW- Leave all other fields their default value.
-
In
Configure SAML
,Attribute Statements
section, add the following attributes, all withUnspecified
forName format
:- email: user.email
- given_name: user.firstName
- family_name: user.lastName
-
Click
Next
. -
In
Feedback
, chooseI'm an Okta customer
, andThis is an internal app
, click Finish. -
On the
Sign On
tab, in theSAML Signing Certificates
section, click the 'Actions' dropdown for theActive
certificate, then right-clickView IdP metadata
then clickCopy Link Address
. If that exact procedure doesn't work you can go to the IdP metadata web page and copy the URL from there. You will need to provide this to Cloud Defense personel, they will complete the setup and tie it to your corporate email domain. -
On the
Assignments
tab, assign the app to your users and groups.
After Cloud Defense support has completed your SAML integration, you should be able to access the Cloud Defense app via SAML by clicking "Sign in with your corporate ID" at the bottom of the login page, then entering your corporate email domain. You can also go to the URL below, with YOUR_DOMAIN_NAME
replaced with your corporate email domain:
https://app.defense.firemon.cloud/sign-in/corporate/YOUR_DOMAIN_NAME
Okta Bookmark App
You can add this to your end user dashboard by adding a bookmark:
- Go to your Okta account admin apps section: https://YOUR-ACCOUNT.okta.com/admin/apps/active
- Click 'Browse App Catalog`.
- Search for and click
Bookmark App
. - Click `Add'.
- Enter an
Application label
, such as Cloud Defense. - Enter the
URL
provided to you by Cloud Defense support. - Leave the boxes unchecked and click
Done
. - On the
Assignments
tab, assign the app to your users and groups.