In this guide you'll learn how to enable the Cloud Secure Edge's (CSE) Device Trust capabilities for SaaS apps in Okta. SonicWall supports a phased roll out that provides high visibility and a great end-user experience.
Leverage this solution guide to accomplish the following:
Allow unregistered devices will allow visibility into how your CSE app rollout is progressing without blocking users and devices immediately. You will be able to see which users are leveraging a CSE registered devices and which users are using devices without CSE on them.
Add the 0.0.0.0/0 CIDR range to account for all devices.
Select Update
You will create a SaaS app policy in CSE for your Okta apps.
Create a user Role that includes users accessing SaaS applications.
Create a Web Policy that includes your role and trust score requirements
You will create an IDP Routed SaaS app in CSE that will link to an Identity Provider in Okta. The policy created in step 2 will be attached and the enforcement mode will be set to "Permissive" so users are not blocked until they have had time to register with the app.
Follow this step to create a SaaS Application in CSE
Ensure the Enforcement Mode for the policy is set to Permissive
This step will only protect SP-initiated flows for certain applications and is only recommended for testing purposes before routing all Okta application traffic.
Begin by routing a few applications to CSE to start your roll out. This will give you a good sense of how your policies are performing before you proceed to Step 5.
Add CSE as an Identity Provider in Okta
Route Specific Applications to CSE
Monitor Unregistered Devices
The unregistered device list view will populate with users who are accessing Okta applications from devices that do not have the CSE (formerly Banyan) certificate.
As more users download and register with the app, this list will decrease and you'll be able to gauge who may be impacted when a policy goes into enforcement.
Once you are comfortable with your policies, you can now route all applications to CSE.
The CSE SaaS app policy is still in Permissive mode and unregistered devices are still allowed. Anyone that does not meet policy requirements will still be able to access their Okta applications.
Follow the steps to protecting all Okta applications and the Okta catalog
Continue monitoring Unregistered Devices
Once you are confident that most of your users have registered with the CSE app and are meeting your policy requirements, it is now time to move the policy into enforcement. This will ensure only registered, trusted devices can access Okta SaaS apps.
There may be scenarios where you want to have different policies for different groups of applications. This is supported by creating multiple Identity Providers in Okta tied to multiple SaaS apps in CSE.
This example shows how to create multiple policies for High Security vs Medium Security applications
{:.alert.alert-warning} In order to protect workflows where a user accesses an application from the Okta catalog, you will need to treat the Okta Catalog as a High Security application.
With these steps, we have provided a way securely roll out CSE device policies for Okta SaaS applications with low user impact.
We addressed the use cases above in the following ways:
Provided a way for a phased rollout of CSE device policies onto Okta SaaS applications while also allowing a fall back for devices that have not been registered yet or do not meet trust score Requirements.
Provided visibility into the devices accessing SaaS applications on unregistered devices, further helping you gauge your impact of moving a policy into enforcement.
Provided a way to set different policies for groups of applications or users.