SAML Setup
General
Cloud Defense supports SP-initiated SAML 2.0 SSO. Once setup is complete, you can start this flow from the main login page by clicking on "Sign in with your corporate ID" and entering your corporate email domain on the subsequent page.
SAML Parameters
ACS URLs (Assertion Consumer Service URLs):
- https://auth.prod.disruptops.com/saml2/idpresponse
- https://firemon.auth.us-west-2.amazoncognito.com/saml2/idpresponse
Most IdPs allow multiple or additional ACS URLs (verified with Okta, Azure, Ping)
Entity ID: urn:amazon:cognito:sp:us-west-2_sxsZbR4hW
Attribute mapping
You need to map the following attributes
- given_name
- family_name
Once your IdP is set up, communicate your metadata file or URL to FireMon Support for completion.
Each user that is allowed to login with via your IdP will be granted read-only access to Cloud Defense the first time the access the app. This user will be assigned a unique username that includes the user's email.
Google Workspace-specific instructions
- Go to admin.google.com and select Apps | Web and mobile apps
- Click on Add app | Add custom SAML app
- Give your app a name and description
- Download the metadata, this will need to be communicated to Cloud Defense
- For
ACS URLenter the firstACS URLabove (Google Workspace SAML does not support multiple ACS URLs) - For
Entity IDenter theEntity IDabove - Leave the rest default and select Continue
- Map the above attributes to the appropriate Google Directory attributes and select Finish
- Add users/groups to access for this application (Under
User Access) - Send the metadata file to Cloud Defense
Okta-specific instructions
-
Go to your Okta account admin apps section: https://YOUR-ACCOUNT.okta.com/admin/apps/active
-
Click
Create App Integration. -
Choose SAML 2.0, click
Next. -
In
General Settings:- Enter an App name, such as Cloud Defense.
- Check both
Do not display application iconboxes. - Click
Next.
-
In
Configure SAML,Generalsection enter the following:Single sign on URL: enter the firstACS URLaboveAudience URI: urn:amazon:cognito:sp:us-west-2_sxsZbR4hW- Leave all other fields their default value.
- Select
Show Advanced Settings - Enter the second
ACS URLfrom above in theOther Requestable SSO URLssection
-
In
Configure SAML,Attribute Statementssection, add the following attributes, all withUnspecifiedforName format:- email: user.email
- given_name: user.firstName
- family_name: user.lastName
-
Click
Next. -
In
Feedback, chooseI'm an Okta customer, andThis is an internal app, click Finish. -
On the
Sign Ontab, in theSAML Signing Certificatessection, click the 'Actions' dropdown for theActivecertificate, then right-clickView IdP metadatathen clickCopy Link Address. If that exact procedure doesn't work you can go to the IdP metadata web page and copy the URL from there. You will need to provide this to Cloud Defense personel, they will complete the setup and tie it to your corporate email domain. -
On the
Assignmentstab, assign the app to your users and groups.
After Cloud Defense support has completed your SAML integration, you should be able to access the Cloud Defense app via SAML by clicking "Sign in with your corporate ID" at the bottom of the login page, then entering your corporate email domain. You can also go to the URL below, with YOUR_DOMAIN_NAME replaced with your corporate email domain:
https://app.defense.firemon.cloud/sign-in/corporate/YOUR_DOMAIN_NAME
Okta Bookmark App
You can add this to your end user dashboard by adding a bookmark:
- Go to your Okta account admin apps section: https://YOUR-ACCOUNT.okta.com/admin/apps/active
- Click 'Browse App Catalog`.
- Search for and click
Bookmark App. - Click `Add'.
- Enter an
Application label, such as Cloud Defense. - Enter the
URLprovided to you by Cloud Defense support. - Leave the boxes unchecked and click
Done. - On the
Assignmentstab, assign the app to your users and groups.