Skip to main content

Installation and Administration Guide

Set Up OIDC SSO

OpenID Connect (OIDC) single sign-on (SSO) requires the following services to communicate with each other:

  • Service provider—The Privitar Data Security Platform​ (the platform) is the service provider.

  • Identity provider—The identity provider (IdP) is the service that manages identity information for your organization. Examples include Okta, Microsoft Entra ID (formerly Azure Active Directory), auth0, Ping, and VMware. The examples in this document use Okta as the IdP, but the instructions apply to all IdPs.

  • BrokerThe platform supports Keycloak as the SSO broker.

Start the Broker Setup

After you configure LDAP on the platform, set up a broker to work with your identity provider. The platform supports Keycloak as the SSO broker.

  1. Obtain the Keycloak admin password by entering the following Kubernetes command (replace <control-plane-namespace> with the name of your control plane):

    kubectl get secret dpp-keycloak-admin-secret -n <control-plane-namespace> -o jsonpath='{.data.admin-password}' | base64 --decode
  2. Copy the value for dpp-keycloak-admin-secret (generated by the DSP installation package).

  3. Go to the Keycloak admin console in your browser at https://<domain>/keycloak/admin.

    A login page appears.

    SSO_Keycloak_Log_In.png
  4. Log in to the Keycloak admin console:

    • Username or email—admin

    • Password—[This is the value for dpp-keycloak-admin-secret that you copied in a previous step.]

  5. Select PrivitarAuth from the Realm menu.

    SSO_Keycloak_Select_PrivitarAuth.png
  6. Click Identity providers in the left navigation.

  7. Select OpenID Connect v1.0 from the Add provider menu.

    SSO_Keycloak_OIDC.png

    The Add OpenID Connect provider page appears.

    SSO_Keycloak_OIDC_ConnectProvider.png
  8. Redirect URI—Copy the redirect URI, which is in the following format:

    https://<domain>/<service_provider>/realms/<realm_name>/broker/<alias>/endpoint

    For example:

    https://acme.privitar.cloud/keycloak/realms/PrivitarAuth/broker/acme-okta/endpoint
  9. Alias—Specify a unique alias for the identity provider.

    This alias will be a component of the redirect uniform resource identifier (URI).

  10. Display name—Specify a display name for the identity provider that will show up in the user interface (UI) of the Keycloak admin console.

  11. Follow the steps in Set Up an Identity Provider.

Set Up an Identity Provider

After you configure LDAP on the platform and set up a broker, you can set up an identity provider.

  1. Log in to your identity provider.

    These instructions use Okta as an example.

  2. Go to Applications.

  3. Click Create App Integration.

    SSO_Okta_App_Integration_Button.png

    The Create a new app integration window opens.

  4. Select OIDC.

    SSO_Okta_App_Integration_OIDC.png

    The Application type section appears.

  5. Select Web Application.

    SSO_Okta_App_Integration_App_Type.png
  6. Click Next.

    The New Web App Integration page appears.

    SSO_Okta_New_App_Integration_OIDC.png
  7. App integration name—Enter a name for the app.

  8. Sign-in redirect URIs—Specify the sign-in URI.

    This is the URI that you noted down while following the steps in Start the Broker Setup.

  9. Sign-out redirect URIs—Specify the sign-out URI.

    You form this by adding /logout_response to the end of the sign-in URI. For example:

    https://acme.privitar.cloud/keycloak/realms/PrivitarAuth/broker/acme-okta/endpoint/logout_response
  10. Controlled access—Specify who should have access to the platform.

  11. Click Save.

    A confirmation page appears.

    SSO_Okta_App_Integration_Conf1.png
  12. Take note of the domain from the URL in your browser's address bar. For example:

    1234567-admin.okta.com
  13. Take note of the client ID.

  14. Take note of the client secret.

  15. Follow the steps in Complete the Broker Setup.

Complete the Broker Setup

After you configure LDAP on the platform, set up a broker and an identity provider, you can now complete the broker setup.

  1. Log in to Keycloak.

  2. Click Identity providers.

  3. Click the Add provider menu, and select OpenID Connect v1.0.

    The Add OpenID Connect provider page appears.

    SSO_Keycloak_Connect_Provider.png
  4. Discovery endpoint —Enter https://<identity-provider-domain>/.well-known/openid-configuration. For example:

    https://1234567-admin.okta.com/.well-known/openid-configuration

    The rest of the fields in this section should auto-populate after you enter this URL.

  5. Scopes—Enter "openid profile email."

  6. Trust email—Select On.

  7. First login flow—Select "Automatically link existing first login flow."

  8. Click Save.

    Your identity provider now appears in the list of identity providers.

  9. Go to Authentication > Flows.

  10. Click browser.

  11. Identity Provider Redirector —Click the Settings (gear) icon.

  12. Default Identity Provider—Enter the provider alias (for example, acme-okta).

  13. Click Save.

Complete Identity Mappings

After you configure LDAP on the platform, set up a broker and an identity provider, and complete the broker setup, you can now complete mappings between your broker and your identity provider.

In order to authenticate a user, the platform requires that the following information exists in the token coming from the identity provider:

  • username

  • email address

  • first name

  • last name

Map these to the following broker user model:

  • userName

  • email

  • firstName

  • lastName

Reference your broker's documentation for specific details. For example, if you use Keycloak as a broker, see https://www.keycloak.org/docs/latest/server_admin/#_mappers.

To complete identity mappings between your broker and your identity provider:

  1. Log in to your identity provider.

    These instructions use Okta as an example.

  2. Go to Directory > Profile Editor > [the name of your Privitar DSP profile, for example "Data Security Platform User"]

  3. Click Mappings.

    SSO_Okta_Mappings_01.png

    The User Profile Mappings window appears.

  4. Click Override with mapping.

    SSO_Okta_Mappings_02.png
  5. Specify nickName as the field from which to populate the username claim.

    SSO_Okta_Mappings_03.png
  6. Click Save.

    A confirmation page appears.

    SSO_Okta_Mappings_04.png
  7. Click Apply updates now.

Your OIDC configuration is complete. Users can now sign in to the Privitar Data Security Platform​ using your identity provider's SSO.