Password Management for Okta Administrators using CyberArk PVWA 

  • Introduction
  • Pre-Requisites
  • Use case Overview
  • Technical Demonstration
  • Conclusion
  • Reference Links

Introduction: 

As Organizations continue to adopt cloud-based identity and access management solutions like Okta, securing administrative access to these platforms has become a top priority. Okta administrators possess elevated privilege allowing them to manage user identities, configure security policies, and access sensitive data. However, this also makes them a prime target for attackers seeking to exploit these privileges. 

To mitigate this risk, it is essential to implement a robust password management solution that can securely store, manage, and rotate administrative credentials. Okta manages password in cloud and the organization desires to manage passwords on-premises using CyberArk Password Vault

To address the integration challenge, we will implement a comprehensive solution that integrates Okta with CyberArk PVWA using SAML 2.0. This integration will enable secure and automated management of Okta admin account passwords, reducing the risk of password-related security incidents and ensuring compliance with regulatory requirements. As part of this solution, two admin accounts will be created in Okta: one non-privileged account to access Okta user dashboard, and a second one Privileged account which will be linked to CyberArk PVWA. The Privileged account will receive a password generated by CyberArk, which will be used for authentication. Using SAML 2.0, the admin will log in to Okta using the privileged account credentials, with the password provided by CyberArk. This will ensure secure and compliant access management and password management processes, streamlining administrative tasks and reducing the risk of security breaches.

Pre-requisites: 

  • Okta tenant, CyberArk PVWA tenant and Active Directory with a Domain. 
  •  Active Directory must be integrated with CyberArk and Okta. 

Use case Overview:

Please refer to the below video to have an understanding about Okta & the use case around integrating CyberArk Password Vault with Okta.

Technical Demonstration:

Here’s the technical walkthrough on the integration between CyberArk Password Vault & Okta.

Conclusion: 

The integration of Okta with CyberArk PVWA provides a comprehensive solution for managing Okta administrator passwords, enhancing security, and improving compliance. By automating password rotation, expiration, and compliance, organizations can reduce administrative burdens and minimize the risk of password-related security incidents. With real-time visibility and control over password management, organizations can respond swiftly on security incidents and ensure the integrity of their identity and access management systems. Overall, this integration provides a robust and scalable solution for securing Okta administrator passwords and protecting sensitive resources and applications. 

Reference Links:

Setup SSO | Okta 

SAML authentication | CyberArk Docs 

Integrating SailPoint IIQ with Okta

  • Introduction
  • Prerequisites
  • Usecase Overview
  • Technical Demonstration
  • Conclusion
  • Reference Links

Introduction

In today’s digital landscape, many organizations face significant challenges in securely managing access to their sensitive data. These unchecked identity challenges often result in vulnerabilities, data breaches, and difficulties in ensuring that only the right individuals have the appropriate access. This solution offers a robust answer to these issues by simplifying and strengthening access control with a governance view. By integrating Okta with product like SailPoint IdentityIQ (IIQ), organizations can strengthen their identity governance and automate the provisioning and de-provisioning processes. This integration ensures that users are granted access solely to the resources they need, thereby minimizing security risks and ensuring compliance.

To get started, organizations need to configure SSO and Okta connectors within Sailpoint IIQ, which link their systems and data sources to enable seamless and secure access management across the enterprise.

Prerequisites

Usecase Overview

Please watch the video to understand why we are integrating SailPoint IIQ with Okta and the specific use case for this integration.

Technical Demonstration

In this video, we’ll show you how to integrate SailPoint IIQ with Okta. We’ll cover setting up SSO, configuring the Okta Connector, and mapping Okta attributes to SailPoint. We’ll also demonstrate how admins manage access reviews and how users can access SailPoint IIQ from Okta.

Conclusion

On a closure note, with all the steps carried out in this use case, it is fair enough to say that we have successfully integrated SailPoint IIQ with Okta, which enhances access management by governing the right identities have access to the right resources. Along with that achieving identity lifecycle management by ensuring synchronized access and governance policies are harmonized between the products. This integration reduces manual processes, increases compliance, and streamlines access control across the organization. Regular monitoring and fine-tuning of policies ensure the integration remains effective as the organizational needs evolve.

Reference Links

Integrating SailPoint IIQ with Okta

Best_Practices_Integration_Guide

Okta Custom Login URL and Branding 

  • Introduction
  • Problem Statement
  • Solution
  • Usecase Overview
  • Technical Demonstration
  • Conclusion
  • Reference Links

Introduction

In today’s enterprise environment, providing a seamless and branded login experience is essential for user engagement, security, and brand identity. Companies using Okta for identity management often seek to customize their login portals to cater to different user such as employees, contractors, and partners. A custom login page not only enhances the user experience but also reinforces the company’s branding and can improve security by providing distinct, role-specific access points. 

This blog describes how to set up personalized login URLs and pages for employees and contractors/partners, enabling each user to enjoy a customized login experience while utilizing Okta’s identity management features.

Problem Statement 

Organizations typically have a diverse set of users, including employees, contractors, and business partners. These users may need to access different resources, apps, and tools, but they may also have different access control policies and security requirements. The need for custom login experiences arises from the following challenges: 

  • Brand Consistency: The login experience should reflect the company’s branding and visual identity. 
  • Role-based Customization: Different users (employees, contractors, partners) may have different access levels and login requirements. 
  • User Segmentation: Having a single login page can be confusing for users from different groups who may have different authentication mechanisms or access privileges. 
  • Security and Compliance: Separate login pages can help implement role-based security policies more effectively. 

Solution 

To address the problem, we propose the following solution using Okta’s customization features: 

Custom Logon URLs and Pages for Different Users 

  • Employee Login Page: A custom URL like https://employeelogin.company.com will serve employees, presenting the company’s branding and specific employee-related apps. 
  • Okta Customization: Okta provides options to customize the login page through its “Okta Sign-In Widget” and “Custom Sign-In Pages.” These tools allow for integrating branding elements (e.g., logos, colors), different authentication methods (e.g., MFA), and a dynamic user flow tailored to each user group. 

Usecase Overview:

Check out the presentation below to explore how to configure a Custom Domain in Okta, including the benefits of custom branding and DNS configurations for a seamless user experience.

Technical Demonstration:

Check out the demo below to see how to configure a Custom Domain in Okta, customize the sign-in page, and apply DNS configurations for a fully branded and secure Okta experience.

Conclusion 

Customizing the Okta login experience for different users like employees, contractors, and partners helps enhance security, improve user experience, and maintain consistent branding. By using Okta’s flexibility in customizing login URLs and pages, along with role-based access control, organizations can ensure that each group has the appropriate level of access while maintaining a branded, user-friendly login process. 

Reference Links

Custom Domains & Branding | Okta 

Use an Okta-managed certificate

Use your own TLS certificate

CyberArk PAM Master Policy

Managing and securing privileged access across diverse IT environments is complex and prone to vulnerabilities. Without a centralized approach, inconsistencies in policy enforcement can lead to security breaches and compliance issues.

Using CyberArk’s PAM Master Policy helps standardize and enforce security and compliance policies consistently across all platforms, reducing the risk of unauthorized access and enhancing overall security.

CyberArk’s PAM Master Policy offers a simple and intuitive way to manage an organization’s security policy.

The Master Policy enables us to configure the security and compliance policy of privileged accounts in an organization from a single pane of glass. It allows us to configure compliance-driven rules, which will be defined as the baseline for the organization.

The Master policy is divided into four higher-level and compliance-driven policy sections, such as:

  1. Privileged Access Workflows
  2. Password Management
  3. Session Management
  4. Audit

Each of the above sections has a set of rules and offers better visibility and control over policy configurations and enforcement.

Master policy rules
Image: Rules of the Master Policy

Master policy settings, when configured, can be applied to most privileged accounts in the organization. However, a few privileged accounts may need to deviate from these global settings for various reasons. We can create exceptions for the accounts that need to deviate from the configured global settings.

The following video will explain CyberArk PAM’s Master Policy and it’s rules in detail. Below are the topics covered as part of this video:

  • The Master Policy
  • Master Policy: Main Concepts
  • Master Policy: Rules
  • Master Policy: Configuring a Rule
  • Privileged Access Workflows
  • Password Management
  • Session Management
  • Audit
  • Exceptions
  • Combining Privileged Access Workflows
CyberArk PAM Master Policy: Technical Presentation

The following video will provide a detailed technical demonstration on configuring the Master Policy:

CyberArk PAM Master Policy: Technical Demonstration

In conclusion, managing privileged access across diverse IT environments is complex and prone to vulnerabilities. The CyberArk’s PAM Master Policy standardizes and enforces security and compliance policies, reducing the risk of unauthorized access. 

ENH iSecure plays a crucial role in this ecosystem by providing comprehensive support and expertise in implementing and managing CyberArk’s PAM Master Policy. With ENH iSecure, organizations can ensure that their privileged access management is not only effective but also aligned with industry best practices and compliance requirements.

Transparent User Management

Introduction:

Managing privileged accounts in complex IT environment is risky due to manual processes, excessive permissions, and limited visibility. This increases security threats, hinders, compliance, and adds administrative burden.

To overcome this problem, CyberArk Transparent User Management addresses these challenges through automation, secure credential gangling and auditing.

CyberArk Transparent User Management automates privileged account provisioning, secure credential management, and access auditing. By integrating with LDAP directories, it streamlines user administration, reduces manual effort, and enhances security. Transparent User Management ensures that access rights remain aligned with roles, minimizing risks from excessive permissions and insider threats.

From the diagram, we can see that users and groups from Active Directory are integrated using LDAP over SSL. After LDAP integration, the users and groups are seamlessly and securely provisioned into CyberArk. These groups from Active Directory are then mapped to predefined groups in CyberArk.

In this blog, we will be discussing about the CyberArk Transparent User Management in detail. The following are the key topics that are discussed as part of the blog.

  1. Types of users in CyberArk
  2. Transparent Users and Groups
  3. Pre-requisites for LDAP Integration
  4. LDAP Integration
  5. Directory Mapping
  6. User Provisioning
  7. LDAP Synchronization
  8. Managing Transparent users and groups

In the video blog of CyberArk Transparent User Management, we will be discussing above mentioned topics.

Presentation:

Detailed demonstration on Transparent User Management is present in the following video.

Demo:

Pass Through Authentication via Active Directory in SailPoint IdentityIQ

In today’s digital age, secure authentication is crucial for all kinds of organizations. Pass Through Authentication enables users to access resources seamlessly without the need for maintaining credentials in on-prem infrastructure. The user credentials are validated against the organization’s directory service such as Active Directory without the need to store credentials. PTA is used commonly in hybrid environments where organizations want control over authentication while integrating with cloud services. The diagram below depicts the process of Pass Through Authentication via Active Directory in SailPoint IdentityIQ.

Image: Pass Through Authentication via Active Directory

  1. A user requests to log in to an application, in our case, SailPoint.
  2. The application (SailPoint) secures the credentials by encrypting them.
  3. The login configuration is checked and found out to be Pass Through Authentication.
  4. The credentials are validated against Active Directory.
  5. After successful validation, the user is logged in.

⦁ Pass Through Authentication ensures the credentials are not stored, reducing the risk of exposure.
⦁ Simplifies user management by validating with a directory system like Active Directory.
⦁ Provides real-time authentication, ensuring accurate and up-to-date access control.
⦁ Offers seamless experience as users can log in to on-prem and cloud-based applications using the same credentials.

Let’s have a close look into Pass Through Authentication in below video.

In this video, a detailed demonstration on Pass Through Authentication via Active Directory and usecases like AD Birthright Provisioning are discussed.

SailPoint Identity Security Cloud Launcher and Launchpad

SailPoint Identity Security Cloud is a comprehensive Identity and Access Management (IAM) solution designed to help organizations manage user access to critical systems and applications efficiently and securely. Within IdentityNow, Launcher and Launchpad are key components that enhance user experience and streamline access management processes.

Launcher

Launcher is a feature within IdentityNow that allows users to manually initiate interactive processes related to access management. It is tied to entitlements and can be assigned to users through regular governance practices. Here’s how it works:

  • Manual Initiation: Users can manually start processes such as access requests, certifications, and reviews.
  • Entitlements: The launcher is linked to specific entitlements, ensuring that users have the appropriate permissions to initiate these processes.
  • Governance Integration: It integrates with IdentityNow’s governance framework, allowing for seamless management and oversight of access-related activities.

Launchpad

Launchpad is a centralized interface within IdentityNow that provides users with a single point of access to various identity management tasks and applications. It offers a user-friendly and intuitive way to navigate and manage identity-related activities. Key features include:

  • Centralized Access: Users can access different identity management functions from one place, improving efficiency and ease of use.
  • Customization: The launchpad can be customized to meet the specific needs of an organization, allowing for personalized dashboards and workflows.
  • Self-Service Capabilities: Users can perform self-service tasks such as password resets, access requests, and profile updates directly from the launchpad.

Creation Flow for Launcher and Launchpad

Together, Launcher and Launchpad enhance the user experience by providing intuitive and efficient ways to manage access and identity-related tasks within IdentityNow.

In the video below, I have thoroughly explained Launcher and Launchpad, along with Forms and Workflow, using a simple presentation:

In this video, I have vividly explained the entire process of Launcher and Launchpad using real-life analogies:

Machine Identity Management in SailPoint Identity Security Cloud

The age of AI and automation is here. With organizations all around the globe leveraging Artificial Intelligence and Machine Learning, more and more tasks and processes previously done manually, are now being automated. This leads to the creation of several machine accounts dealing with Robotic Process Automation (RPA), privileged service accounts for authenticating requests from an external system, and the like. Consequently, organizations are spending more time and resources managing the access held by these non-human accounts in every application, which can often lead to complicated situations as there is no centralized view of the same.

As described above, organizations are automating mundane processes, and thus more machine accounts are being created. These accounts can be difficult to manage and govern in a standalone environment, considering the lack of ownership and effective ways to control and manage their access. The following are some statistical insights on machine accounts shared by SailPoint: –

This gives a clear picture as to how AI, Automated Scripts and Robotic Processes are taking over the workplace, which signifies the difficulty as well as importance of managing these machine accounts.

This is where SailPoint’s Machine Identity Security jumps in. It offers a robust set of features to:-

  • Discover any accurately configured machine account on any source
  • Classify the accounts as machine accounts, by using an account attribute/set of attributes (eg, in Active Directory, if there are machine accounts containing the word “bot” in their sAMAccountName, we can use this account attribute to classify these accounts as machine accounts in SailPoint)
  • Assign a human owner to a machine account. This identity will be responsible for reviewing the access held by the machine account in a certification campaign
  • Correlate the machine accounts to machine identities
  • Certify the machine account’s access using Certification Campaigns

The diagram above depicts SailPoint Machine Identity Security, which aggregates machine accounts from various applications such as Active Directory, SAP and Web Service and manages them under a single platform i.e., Identity Security Cloud.

There are several advantages to using SailPoint Machine Identity Security: –

  • It provides clear visibility and insights on all machine accounts across various applications.
  • It provides tools to automate the management of machine accounts. This eliminates the need to maintain and manage these accounts and their access manually, such as on excel sheets.
  • Human owners can be assigned to machine accounts, ensuring accountability, risk detection and mitigation.
  • Access reviews via Certification Campaigns help ensure that machine accounts follow the principle of Least Privileged Access Control.

Let’s have a close look at how SailPoint Machine Identity Security works in the following video: –

The following video is a deep dive demonstration of SailPoint Machine Identity Security: –

Hope this blog gave you some insights into how you can use SailPoint Machine Identity Security to effectively classify, manage and govern machine accounts from any source. Please share your thoughts and feedback in the comment box below.

Please follow our socials to stay up to date with the latest technology content.

Thank you!

SailPoint Identity Security Cloud Multi Host Groups

Introduction:

Modern Enterprises have huge infrastructure and configurations, governing and managing them in complex and difficult.

To overcome this problem, SailPoint Identity Security Cloud Multi Host Groups allows easier management of infrastructure and related integrations.

Multi Host Groups helps bulk source creation of infrastructure components and server configurations from a centralized location.

Basically, it is a container which holds sources and associated account aggregation and entitlement aggregation groups. So that we can aggregate all the sources at once, instead of doing one at a time.

From the diagram we can see, without multi host group, we need to aggregate all the sources, one at a time, which will be redundant and time consuming, but using multi host groups we can aggregate a group of sources once.

Features:

Below, is the list of available features in SailPoint Identity Security Cloud Multi Host Groups:

  • Bulk Source Integration
  • Support for MS SQL Server and Oracle Database Connector use cases
  • Aggregation Groups
  • Centralized integrations

In this blog, we will be discussing about the Identity Security Cloud Multi Host Group in detail. The following are the key topics that are discussed as part of the blog.

  1. What is Multi Host Group?
  2. Key Features of Multi Host Group.
  3. Creating and Viewing Multi Host Groups.
  4. Editing, Testing and Deleting Multi Host Groups
  5. Managing Account and Entitlement Aggregation Groups
  6. Limitations and Best Practices

In the video blog of SailPoint Identity Security Cloud Multi Host Groups, we will be discussing above mentioned topics.

Video:

Detailed demo on managing multi host groups is present in the following video.

Video:

SailPoint Identity Security Cloud Loopback Connector

Problem:

In SailPoint Identity Security Cloud, we often face challenges in managing and governing user level permissions and governance group membership effectively, which may lead to unauthorized access and audit failures. Governing access inside Identity Security Cloud is important.

Current blog helps govern access in Identity Security Cloud using Identity Security Cloud loopback connector.

Solution – Loopback connector:

The purpose of loopback connector is used to manage Identity Security Cloud user levels and governance groups as entitlements.

Users can request for elevated user levels permissions and governance groups as entitlements through request center. Once that is approved user will get required higher permission or governance group membership based on requested entitlement.

Supported Operations:

Below are the supported operations in loopback connector:

  • Account Aggregation
  • Governance Groups Aggregation
  • User levels Aggregation
  • Provisioning
  • Add Entitlement
  • Remove Entitlement

Operations and APIs

Below is the list of endpoints we used for each operation in loopback connector:

S. NoOperationsEndpoints
1Account Aggregation/v3/accounts
2Governance Group Aggregation/beta/workgroups
3Provisioning/v3/accounts
4Authentication/oauth/token
5Add Entitlement for User Levels/v3/auth-users/:id
6Add Entitlement for Governance Groups/v3/workgroups/accessId/members/bulk-add

In this blog, we will be discussing about the Identity Security Cloud Loopback Connector in detail. The following are the key topics that are discussed as part of the blog.

  1. Problem statement
  2. What is loopback connector and what we can achieve from that?
  3. Use cases we can achieve using loopback connector
  4. What are the supported operations?
  5. End points used for each operation.

In the video blog of SailPoint Identity Security Cloud Loopback Connector, we will be discussing above mentioned topics.

Video:

Detailed demo on developing & testing loopback connector is present in the following video.

Video:

All the mentioned technical components are only available for internal use. However, refer to the below table for an overview on different technical components, which can be used to develop the loopback connector.

S. NoComponent NameUse
1Java ProgramThis program is used to take details like tenant id, client id, client secret and source id and update all rules with provided input data.
2Account Aggregation RuleThis is Webservice After Operation Rule. Users can build this rule in such a way, where they can read all the available accounts from the respective tenant.
3User Levels Aggregation RuleThis is Webservice After Operation Rule. Users can build this rule in such a way, where they can read all user levels available from the respective tenant.
4Governance Groups Aggregation RuleThis is Webservice After Operation Rule. Users can build this rule in such a way, where they can read all the available governance groups from the respective tenant..
5Add EntitlementThis is Webservice Before Operation Rule. Users can build this rule in such away, upon entitlement request, respective governance group membership or elevated permissions are assigned to users
6Remove EntitlementThis is Webservice Before Operation Rule. Users can build this rule in such away, respective governance group membership or elevated permissions are removed from users.