Skip to main content

Installation and Administration Guide

Set Up SAML SSO

Security Assertion Markup Language (SAML) single sign-on (SSO) requires the following services to communicate with each other:

  • Service provider—The Privitar Data Security Platform​ (the platform) is the service provider.

  • Identity provider—The identity provider (IdP) is the service that manages identity information for your organization. Examples include Okta, Microsoft Entra ID (formerly Azure Active Directory), auth0, Ping, and VMware. The examples in this document use Okta as the IdP, but the instructions apply to all IdPs.

  • BrokerThe platform supports Keycloak as the SSO broker.

Start the Broker Setup

After you configure LDAP on the platform, set up a broker to work with your identity provider. The platform supports Keycloak as the SSO broker.

  1. Obtain the Keycloak admin password by entering the following Kubernetes command (replace <control-plane-namespace> with the name of your control plane):

    kubectl get secret dpp-keycloak-admin-secret -n <control-plane-namespace> -o jsonpath='{.data.admin-password}' | base64 --decode
  2. Copy the value for dpp-keycloak-admin-secret (generated by the DSP installation package).

  3. Go to the Keycloak admin console in your browser at https://<domain>/keycloak/admin.

    A login page appears.

    SSO_Keycloak_Log_In.png
  4. Log in to the Keycloak admin console:

    • Username or email—admin

    • Password—[This is the value for dpp-keycloak-admin-secret that you copied in a previous step.]

  5. Select PrivitarAuth from the Realm menu.

    SSO_Keycloak_Select_PrivitarAuth.png
  6. Click Identity providers in the left navigation.

  7. Select SAML v2.0 from the Add provider menu.

    SSO_Keycloak_SAML.png

    The Add SAML provider page appears.

    SSO_Keycloak_Add_SAML_Provider.png
  8. Redirect URI—Copy the redirect URI, which is in the following format:

    https://<domain>/<service_provider>/realms/<realm_name>/broker/<alias>/endpoint

    For example:

    https://acme.privitar.cloud/keycloak/realms/PrivitarAuth/broker/acme-okta/endpoint
  9. Alias—Specify a unique alias for the identity provider.

    This alias will be a component of the redirect uniform resource identifier (URI).

  10. Display name—Specify a display name for the identity provider that will show up in the user interface (UI) of the Keycloak admin console.

  11. Service provider entity—Copy this URL for later use.

  12. Follow the steps in Set Up an Identity Provider.

Set Up an Identity Provider

After you configure LDAP on the platform and set up a broker, you can set up an identity provider.

  1. Log in to your identity provider.

    These instructions use Okta as an example.

  2. Go to Applications.

  3. Click Create App Integration.

    SSO_Okta_App_Integration_Button.png

    The Create a new app integration window opens.

  4. Select SAML.

    SSO_Okta_App_Integration_SAML.png

    The Application type section appears.

  5. Click Next.

    The Create SAML Integration page appears.

    SSO_Okta_New_App_Integration_SAML.png
  6. App name—Enter a name for the app. For example, enter "Data Security Platform SAML".

  7. App logo (optional)—Upload a logo for the app.

  8. App visibility—Indicate whether the app icon should appear for users.

  9. Click Next.

    The Configure SAML tab appears.

    SSO_Okta_New_App_Integration_SAML_02.png
  10. Single sign-on URL—Enter the redirect URI that you noted down while following the steps in Start the Broker Setup. For example:

    https://acme.privitar.cloud/keycloak/realms/PrivitarAuth/broker/acme-okta/endpoint
  11. Select whether to use this URL for both the recipient URL and destination URL.

  12. Audience URI (SP Entity ID)—Enter the service provider entity URL that you noted down while following the steps in Start the Broker Setup. For example:

    https://acme.privitar.cloud/keycloak/realms/PrivitarAuth/
  13. Default RelayState—Leave this field blank.

  14. Name ID format—Select X509SubjectName.

  15. Application username—Select Email prefix.

  16. Update application username on—Select Create and update.

  17. Click Save.

  18. Click the Assignments tab.

  19. Specify who should have access to the platform.

    SSO_Okta_New_App_Integration_SAML_03.png
  20. Click the Sign On tab.

    SSO_Okta_New_App_Integration_SAML_04.png
  21. Metadata details—Click Copy.

  22. Click Save.

    A confirmation page appears.

  23. Follow the steps in Complete the Broker Setup.

Complete the Broker Setup

After you configure LDAP on the platform, set up a broker and an identity provider, you can now complete the broker setup.

  1. Log in to Keycloak.

  2. Click Identity providers.

  3. Click the Add provider menu, and select SAML v2.0.

    The Add SAML provider page appears.

    SSO_Keycloak_SAML_ConnectProvider.png
  4. SAML entity descriptor —Paste the metadata URL that you copied when completing the steps in Set Up an Identity Provider.

    The rest of the fields in this section should auto-populate after you enter this URL.

  5. Click Add.

  6. Trust email —Select On.

  7. First login flow —Select Automatically link existing first login flow.

  8. Click Save.

    Your identity provider now appears in the list of identity providers.

  9. Go to Authentication > Flows.

  10. Click browser.

  11. Identity Provider Redirector —Click the Settings (gear) icon.

  12. Default Identity Provider—Enter the provider alias (for example, acme-okta).

  13. Click Save.

Complete Identity Mappings

After you configure LDAP on the platform, set up a broker and an identity provider, and complete the broker setup, you can now complete mappings between your broker and your identity provider.

In order to authenticate a user, the platform requires that the following information exists in the token coming from the identity provider:

  • username

  • email address

  • first name

  • last name

Map these to the following broker user model:

  • userName

  • email

  • firstName

  • lastName

Reference your broker's documentation for specific details. For example, if you use Keycloak as a broker, see https://www.keycloak.org/docs/latest/server_admin/#_mappers.

To complete identity mappings between your broker and your identity provider:

  1. Log in to your identity provider.

    These instructions use Okta as an example.

  2. Go to Directory > Profile Editor > [the name of your Privitar DSP profile, for example "Data Security Platform User"]

  3. Click Mappings.

    SSO_Okta_Mappings_01.png

    The User Profile Mappings window appears.

  4. Click Override with mapping.

    SSO_Okta_Mappings_02.png
  5. Specify nickName as the field from which to populate the username claim.

    SSO_Okta_Mappings_03.png
  6. Click Save.

    A confirmation page appears.

    SSO_Okta_Mappings_04.png
  7. Click Apply updates now.

Your SAML configuration is complete. Users can now sign in to the Privitar Data Security Platform​ using your identity provider's SSO.