Prisma Cloud: OIDC SSO Setup on Okta
Objective
Please reference this article if you would like to setup OIDC SSO with Okta in Prisma Cloud(CSMP).
Environment
- Prisma Cloud
- Okta
Procedure
The first step is to navigate to the Okta Portal, I created my 30 day trial account here: okta.com/free-trial/
After creating your account on Okta, navigate to Applications --> 'Create App Integration':
Choose the following options:
- Sign-in Method = 'OIDC - OpenID Connect'
- Application type = 'Web Application
For the next step gather the 'Callback URL' and 'Authentication URL' from Prisma Cloud > Settings > Access Control > SSO > OIDC:
Now back to the Okta app:
- Add an App integration name
- Check Grant type, 'Client Credentials' option
- Add the Callback URL and Authentication URL from Prisma Cloud to 'Sign-in redirect URIs'
- In the Assignments sections for Controlled access, select the 'Allow everyone in your organization to access' option
- Save the App
Now we will 'Edit' the App's General Settings to add 'Initiate login URI' ( Authentication URL from Prisma) and 'Callback URI' (Callback URL from Prisma) and finally save:
Your App on Okta should look something like this:
(Optional) You can add more users to your Okta by navigating to 'Directory' > 'People' > 'Add Person':
This concludes the setup on Okta. Next, we head back to Prisma to set up OIDC settings.
Prisma Cloud > Settings > Access Control > SSO > OIDC:
- Enable OIDC
- Copy and paste the 'Client ID' from Okta into Prisma 'Client ID' field
- Copy and paste the 'Client Secrets' from Okta into Prisma 'Client Secret' field
Next, we will grab our base URL for our Okta tenant from your user drop-down as depicted here:
Once we have this base URL we will create our Endpoints for Prisma OIDC setup.
- Endpoint Issuer = https://<okta tenant>/.well-known/openid-configuration
- Authorization Endpoint = https://<okta tenant>/oauth2/v1/authorize
- JWK Set Endpoint = https://<okta tenant>/oauth2/v1/keys
- Token Endpoint = https://<okta tenant>/oauth2/v1/token
Save these settings to finish the OIDC setup.
Test by navigating to the Prisma cloud login page and select sign in with SSO:
Additional Information
With SP-Initiated OIDC SSO enabled, users can only access this Prisma Cloud console via the “Sign in with SSO” link on the login page.