Purpose
The purpose of this document is to provide setup information on the Azure AD integration.
Introduction
This document provides step by step instructions on how to connect the Outpost24 tools, OUTSCAN and HIAB, with Azure AD in order to enable Single Sign On capability. The SSO can be initiated from both Service Provider and Identity Provider sides: respectively from Outpost24 tools, OUTSCAN, HIAB and Microsoft Azure portal side, myapps.microsoft.com.
Getting the SP Metadata File
You will require the SP metadata file from the Outpost24 tool you wish to integrate with.
On the Outpost24 Tool
-
Navigate to Main Menu > Settings > Integrations > Identity Provider
-
Select the Enabled checkbox and click the SP Metadata button
Azure AD Configuration
-
Login to https://portal.azure.com.
-
Once in the portal, in the navigation bar search Active Directory.
Creating a new Enterprise Application
-
In the sidebar navigation, select Enterprise Applications.
-
Select the + New application button.
-
In the Add an application screen, select the + Create your own application button and in the left panel select the Non-gallery application, and give the application a name that is recognizable and click Add. Azure will create the application ready for configuration.
-
Customize your newly created enterprise by uploading the O24 logo. This logo is displayed on the myapps.microsoft.com portal and enhances the user experience.
-
In the Enterprise applications section select <OUTPOST24 HIAB>
-
Then select Properties.
-
Select the Logo.
-
Select a file containing the OP24 logo.
-
The O24 logo file size can not exceed 100.4 kB.
Allowed file formats
-
jpeg
-
jpg
-
gif
-
png
-
bmp
Setting up Single Sign On
-
In the Getting Started section select Set up single sign on and select the SAML option.
a) Select the Upload metadata file and navigate to the downloaded Outpost24 metadata file from the previous steps. This populates the fields under the Basic SAML Configuration view that you can Edit.
Entity ID should show: https://<IP>/opi/XMLAPI?ACTION=SHOWSPMETADATA&UUID=<uuid>
Reply URL should show: https://<IP>/opi/XMLAPI?ACTION=SAMLRESPONSE&UUID=<uuid>
Sign on URL field should remain empty.
Where IP is the <IP> of the Outpost24 Tool you are integrating with and where <uuid> is the universal unique identifier that identifies your account.
OUTSCAN Configuration
In case you are configuring this for OUTSCAN, <IP> value is the OUTSCAN FQDN: outscan.outpost24.com
-
Define Attributes and Claims:
a) Click Edit under the User Attributes and Claims section.
b) Click the + Add new Claim button.
c) Configure the following information in the Manage Claim screen.
Claim Name requirement
Make sure that the Name for the claim match the Subject attribute you entered in the Identity Provider section of the Integrations Settings panel on HIAB/OUTSCAN (default being uid).
Namespace:can be left blank
Source: Select the Transformation radio button
laim Name considerations
uid is a reserved name in Outpost24 software to truncate the USERNAME to the part below the @ sign, meaning that if you want to use an email address as USERNAME, you can not use uid as Claim name, but you can use any other string (such as emailAddress).
Claim Name requirement
Make sure that the Name for the claim match the Subject attribute you entered in the Identity Provider section of the Integrations Settings panel on HIAB/OUTSCAN (default being uid).
d) In the Manage Transformation pop up view enter the following information.
|
Recommended settings |
|---|
|
Transformation: ExtractMailPrefix() Parameter 1: user.userprincipalname Those settings correspond to standard practice to be able to login with a USERNAME matching the part below the @ sign in the user's email address. For instance, if the user's email address is firstname.lastname@somedomain.com, then the user will be able to login using firstname.lastname as username once configured in HIAB/OUTSCAN.
Claim Transformation considerations By default, Azure ID populates the User Principal Name of Identity section of a user with the email address when creating the user. Depending on your configuration, it may happen that this field is empty and that the email address of the user is set in the Email of the Contact Info section of the user. In this case, replace the Parameter.1 with user.mail. |
Custom advanced settings
In order to create some custom advanced settings using some specific attribute or different transformation option, please ensure that all select fields and user.x value are properly populated for all the user in the Azure Active Directory.
Please also ensure that the results of your claim configuration match the USERNAME for the HIAB/OUTSCAN user.
e) Click the Add button. The transformation field now show the configuration you just created.
f) Click the Save button.
If you want to use an email address as USERNAME in Outpost24 software, create a Claim that does not use uid (which is a reserved name in Outpost24 software) as name and that refers to an attribute that contains an email address such as in the sample below:
|
Example |
|---|
You can name the claim on Azure AD as you want (except 'uid' which is reserved word) then you must name the same in subject attribute of the Identity Provider view.
|
-
Grant users access to the enterprise application you have defined
Important: Grant access to the Enterprise Application
By default Azure AD, does not grant access to the Enterprise application to any user. The access have to be granted in the User and Groups section of the applications, by clicking on the + Add user/group button.
-
Return to the Outpost24 HIAB Application configuration screen.
OUTSCAN or HIAB Configuration
In order to configure OUTSCAN/HIAB to use OneLogin as identity provider, you need to achieve the following steps:
-
Retrieve the metadata file describing the identity provider
-
Adjust the metadata file (if needed)
-
Upload the metadata file in OUTSCAN/HIAB
Retrieve Identity Provider Metadata file
Under section 3 of the SAML-based Sign On screen > SAML Signing Certificate. Download the Federation Metadata XML file. You receive a XML file which is named the name of the application you have created in Azure.
Adjust Identity Provider Metadata File
To integrate an Identity Provider (IdP) in OUTSCAN or HIAB, you have to upload the SAML Metadata file describing the IdP. This file must comply to the SAML standard.
Upload the SAML Metadata File
Open the SAML Metadata file retrieved from the Identity Provider (IdP) and make sure that:
-
The file contains the XML tag: <?xml version='1.0' encoding='UTF-8'?>
XML tag consideration
If the XML tag is not present, just add the following tag <?xml version='1.0' encoding='UTF-8'?> at the beginning of the file.
-
The EntityDescriptor section contains validUntil attribute
validUntil attribute consideration
If this attribute is not present, just add it using the following format: validUntil="YYYY-MM-DDTHH:MM:SS"
A valid SAML Metadata file should looks like the following
SAML Metadata file consideration
Uploading the file in its current state will result in an error.
Set Up Identity Provider
An Identity Provider (IdP) offers user authentication as a service. It is a trusted provider that allows the use of single sign-on (SSO) to access other application. SSO enhances usability by reducing password fatigue as passwords are maintained on your IdP.
Configure Identity Provider (IdP) SSO in Outpost24 by importing IdP metadata, mapping subject attributes, and enabling federated login via SAML.Ensure that the Subject attribute in the integration settings match the claim name in Azure AD
Verifying Integration Functionality
SP initiated SSO, eg from Outpost24 tool
-
Navigate to the login screen for the Outpost24 Tool
-
Enter the Outpost24 username (part below the @ sign in the user's email address as previously recommended settings) of the user added to the Outpost24 Application within Azure
-
Click single sign on and you will be redirected to login via the Azure portal.
The users AD account will need to be added to the Outpost24 Application in Azure to successfully login.
IdP initiated SSO, eg from myapps.microsoft.com
-
Login to myapps.microsoft.com.
-
Click on <OUTPOST24 HIAB> and you are redirected to Outpost24 Application, depending on settings to either NetSec UI or Portal UI.
Related Articles
- Windows 10/Windows 2019 Server
- HIAB Updates
- General Information about SMB/WinRM Scanning
- Change Risk Levels
- Removing an Agent from Windows
- ServiceNow - Legacy
- Windows 8.1
- Netsec Filters
- Discovering the Agent in OUTSCAN
- Technical Specification
- Account Settings
- How to Test SMB Authentication
- Windows 2016 Server
- Identity Provider Settings
- HIAB Server Settings
- Installing a Linux Agent
- Okta Identity Provider Configuration
- Scanning-Less Scanning
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- Overview
- Event Notification Module
- HIAB Maintenance Settings
- HIAB Deployment Guide
- Database Connector (HIAB only)
- Azure AD Identity Provider Configuration
- Add Comments
- Target Groups
- Checking if Agent is Running
- Core Installation
- Windows 2008 R2 Server
- Agent Installation Introduction
- Automatic Asset Joining With Netsec
- Manage Users
- Firewall Setup for Agents
- Scanning Range
- SNMP (HIAB only)
- ADFS Identity Provider Configuration
- Splunk
- Agent Call Home
- Advanced Report Filters
- Accept Risks
- SMB Authentication from OUTSCAN/HIAB
- Virtual HIAB Appliance
- Using the Agent Info Command
- Amazon
- User Roles
- Removing an Agent from Linux
- Retrieving the Agent UUID
- Atlassian Jira
- Understanding Scanner and Scheduler
- Finding the Agent Version
- Create and Edit Event Notifications
- Installing a macOS Agent
- Syslog (HIAB only)
- Setting Up an Agent Using System Proxy
- ServiceNow - App
- Thycotic
- DNS Lookup in UI and in Console
- HIAB Console
- Auditing Guide
- Adding Agent Attributes
- HIAB Distribution Settings
- Run Verification Scans
- Agent Latest Version
- Finding New Agents In OUTSCAN
- Setting up a HIAB as an Appsec Scale Scanner
- Checking Schedules from OUTSCAN in Agent
- Hardening the HIAB
- Performing a PCI DSS Scan
- Two Factor Authentication
- Attributes
- Firewall Rules
- HIAB Enrollment
- Supported Platforms for Authenticated SSH Scanning
- Authenticated Scanning Using WinRM
- OneLogin Identity Provider Configuration
- Windows 7
- HIAB Remote Support
- Compliance Scanning
- Manage Targets
- Assign Tasks
- Authenticated Scanning Using SSH
- Tickets Quick Start Guide
- Retrieving Results From the Agent in OUTSCAN
- Appliance Logs
- Converting Normal with Webapp Scans (Netsec) to Portal Workflows
- Updating the Agent
- Troubleshooting SMB Authentication
- Agent Licensing
- Mark as False Positives
- Installing a Windows Agent
- Using Farsight in Netsec
- Testing Target System for Open TCP Ports
- HIAB Restore
- Scan Stages
- Request Clarifications
- HIAB Setup Guide
- Updating Agent Attributes
- CyberArk
- LDAP/AD
- Checking if the Agent has Produced Results
- ArcSight (HIAB only)
- HIAB E-mail Whitelisting
- Adjust Identity Provider SAML Metadata File
- Scanning Critical Industrial Devices/Machines
- Reporting Tools
- Scan Scheduling
- Scanning Performance and Impact Tuning
- PCI Compliance Scanning
- Configuring and Accessing the HIAB console using SSH
- User Groups
- Create Users
- HIAB Remote SSH Guide
- Download Agents
- Create Targets
- Windows 2012 R2 Server
- HIAB Backup
- Report Scheduling
- Access Tokens
- O24AUTH
- Complementary Authenticated Scan on Default Credentials
- Authenticated Scanning Using SMB
- Dynamic Target Group