This document describes how you can use the services of Okta to authenticate the sessions of your privileged users with One Identity Safeguard for Privileged Sessions (SPS).
One Identity Safeguard for Privileged Sessions:
One Identity Safeguard for Privileged Sessions (SPS) controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SPS is a quickly deployable enterprise device, completely independent from clients and servers — integrating seamlessly into existing networks. It captures the activity data necessary for user profiling and enables full user session drill down for forensic investigations.
SPS acts as a central authentication gateway, enforcing strong authentication before users access sensitive IT assets. SPS can integrate with remote user directories to resolve the group memberships of users who access nonpublic information. Credentials for accessing information systems can be retrieved transparently from SPS's local Credential Store or a third-party password management system. This method protects the confidentiality of passwords as users can never access them. When used together with Okta (or another Multi-Factor Authentication (MFA) provider), SPS directs all connections to the authentication tool, and upon successful authentication, it permits the user to access the information system.
Okta Adaptive Multi-factor Authentication:
Okta is a cloud-based identity service offering identity, authentication, and access control functions as a service. To support multi-factor authentication, SPS integrates with the Okta identity management service. This enables you to leverage an additional out-of-band factor (typically through the user’s registered smartphone) when authenticating the user. The additional factor is processed in-line with the connection, so users do not have to switch to an external application to process the additional factor. This results in a seamless and efficient user experience that is readily accepted by the users.
The One Identity Safeguard for Privileged Sessions can interact with your Okta account and can automatically request strong multi-factor authentication for your privileged users who are accessing the servers and services protected by SPS. Okta supports a broad range of authentication methods, including software, hardware, and cellphone-based solutions.
Solution benefits
Matt Magleby, Sr. Computer Scientist at Adobe
One Identity Safeguard for Privileged Sessions helps us meet a portion of our compliance and internal security requirements related to access management.
Using SPS together with Okta provides the following benefits:
-
Easy-to-use multi-factor authentication secures privileged access to business-critical servers. The enforcement of a second-factor authentication and the availability of session recordings make access of high-risk users more secure.
-
Outband authentication to protect against privileged identity theft.
-
Logs and audits administrative network traffic.
-
Integrates with existing LDAP user directory.
-
Easy and fast deployment and implementation: a network-level solution that does not require installing agents on clients or servers.
-
Can forward user logs into Splunk for long-term storage and analysis.
-
Supports SSH and RDP protocols to access both Linux and Windows servers, without disrupting the daily workflow of your system administrators and other privileged users.
-
Supports strong authentication methods, including SSH keys and certificates.
Meet compliance requirements
ISO 27001, ISO 27018, SOC 2, and other regulations and industry standards include authentication-related requirements, (for example, Multi-Factor Authentication (MFA) for accessing production systems, and the logging of all administrative sessions). In addition to other requirements, using SPS and Okta helps you comply with the following requirements:
-
PCI DSS 8.3: Secure all individual non-console administrative access and all remote access to the cardholder data environment (CDE) using MFA.
-
PART 500.12 Multi-Factor Authentication: Covered entities are required to apply MFA for:
-
Each individual accessing the covered entity’s internal systems.
-
Authorized access to database servers that allow access to nonpublic information.
-
Third parties accessing nonpublic information.
-
NIST 800-53 IA-2, Identification and Authentication, network access to privileged accounts: The information system implements MFA for network access to privileged accounts.
In order to successfully connect SPS with RADIUS server, you need the following components.
In Okta:
-
A valid Okta subscription that permits multi-factor authentication.
-
An Okta API key. You will need it to configure the SPS plugin.
-
Your users must be available in Okta.
-
The users must activate their Okta accounts, and be able to perform the authentication required for the factor (for example, install the Okta mobile app, possess the required hardware token, and so on).
-
A factor that the SPS plugin supports must be enabled in Okta. Note that this is a global setting, you cannot selectively enable factors. For a list of factors that SPS supports, see Supported factors and scenarios.
In SPS:
-
A copy of the SPS Okta Multi-Factor Authentication plugin. This plugin is an Authentication and Authorization (AA) plugin customized to work with the Okta multi-factor authentication service.
-
SPS must be able to access the Internet (at least the services on https://www.okta.com). Since is a cloud-based service provider, SPS must be able to access its web services to authorize the user.
-
Depending on the factor you use to authenticate your users, your users might need Internet access as well, for example, to use the Okta Verify Push Notification factor. Note that the Okta app generates one-time passwords (OTPs) offline.
-
TLS version 1.3 is not supported when using the inWebo, Okta or One Identity Starling 2FA plugins. To ensure that TLS 1.2 is used by SPS during negotiation, specify the minimum and maximum TLS version as follows:
-
For the minimum TLS version, select TLS version 1.2.
-
For the maximum TLS version, select TLS version 1.3.
For more information, see "Verifying certificates with Certificate Authorities using trust stores" in the Administration Guide.
-
SPS supports AA plugins in the MSSQL, RDP, SSH, and Telnet protocols.
-
In RDP, using an AA plugin together with Network Level Authentication in a Connection Policy has the same limitations as using Network Level Authentication without domain membership.
-
In RDP, using an AA plugin requires TLS-encrypted RDP connections. For details, see "Enabling TLS-encryption for RDP connections" in the Administration Guide.
Availability and support of the plugin
The SPS Okta Multi-Factor Authentication plugin is available for download as-is, free of charge to every SPS customer from the Okta Multi-Factor Authentication plugin for SPS page. In case you need any customizations or additional features, contact our Support Team.
|
Caution:
Using custom plugins in SPS is recommended only if you are familiar with both Python and SPS. Product support applies only to SPS: that is, until the entry point of the Python code and passing the specified arguments to the Python code. One Identity is not responsible for the quality, resource requirements, or any bugs in the Python code, nor any crashes, service outages, or any other damage caused by the improper use of this feature, unless explicitly stated in a contract with One Identity. If you want to create a custom plugin, contact our Support Team for details and instructions. |
Supported factors and scenarios
The SPS Okta plugin can provide multi-factor authentication in the Remote Desktop (RDP), Secure Shell (SSH), and TELNET protocols. In RDP, using push notifications (when the user authenticates using the Okta mobil app) is the most convenient method. You can use another factor, but in this case the user must encode the OTP password into the username used in the connection, before trying to connect to the server.
Okta supports several different authentication backends ("factor types" in Okta terminology). When using one-time passwords (OTP-like factors), your users can specify which factor they use (from the ones available for them in Okta).
You can also set a default factor in the Okta configuration, it defaults to Okta Verify (One-Time Password).
The SPS Okta plugin supports the following authentication factors:
-
Google Authenticator (One-Time Password)
-
Okta Push Authentication
-
Okta Verify (One-Time Password)
-
RSA token
-
Symantec token (One-Time Password)
-
YubiKey token (One-Time Password)
You can also configure SPS to require multi-factor authentication only from selected users or usergroups. You can also specify exceptions, that is, require multi-factor authentication from everyone except the specified users. This allows you to have emergency or break-glass users who can access your servers even if the Okta services are not available. For details, see "[WHITELIST]" in the Okta Multi-Factor Authentication - Tutorial.
Detailed overview of SPS interworking with Okta
The following figure illustrates how SPS and Okta interwork with each other.
Figure 1: SPS interworking with Okta
If SPS is integrated with Okta, the interaction of the two products consists of the following steps:
-
Connect to a protected server.
-
SPS performs gateway authentication.
SPS receives the connection request and authenticates you. SPS can authenticate you to a number of external user directories (for example: LDAP, Microsoft Active Directory, or RADIUS). This is the first factor of authentication.
-
SPS checks if you are exempt from multi-factor authentication.
You can configure SPS using whitelists and blacklists to selectively require multi-factor authentication (for example, to create break-glass access for specific users).
-
If multi-factor authentication is not required, you can access the protected server, while SPS records your activities. The procedure ends here.
-
If multi-factor authentication is required, SPS continues the procedure with the next step.
For details on creating exemption lists, see [WHITELIST].
-
Configure the Okta plugin to map the gateway usernames to the Okta external identity.
If the gateway usernames are different from the external Okta identities. You must configure the SPS Okta plugin to map the gateway usernames to the external Okta identities.
To map the gateway username to the external identity, query an LDAP or Microsoft Active Directory server, or if applicable, append a domain name to the gateway username.
For details, see [USERMAPPING].
-
SPS performs outband authentication on Okta.
If gateway authentication is successful, SPS connects the Okta server to check which authentication factors are available for you. After that, SPS requests the second authentication factor from you.
-
For OTP-like authentication factors, SPS requests the OTP from you, and sends it to the Okta server for verification.
-
For the Okta push notification factor, SPS asks the Okta server to check if you successfully authenticated on the Okta server.
-
If multi-factor authentication is successful, you can connect to the protected server, while SPS records your activities.
Optionally, SPS can retrieve credentials from a local or external Credential Store or password vault, and perform authentication on the server with credentials that are not known to you.
-
If you open a new session within a short period, you can do so without having to perform multi-factor authentication again. After this configurable grace period expires, you must perform multi-factor authentication to open the next session.
For details, see [authentication_cache].