This guide details the steps required to use SonicWall Cloud Secure Edge (CSE) SAML Proxy to secure a single Okta SaaS application. These steps cover securing IDP initiated as well as SP initiated flows for an application.
Before proceeding through the Steps sections below, please ensure you have:
1.1 In the Command Center, navigate from Manage Services > SaaS Applications, then select + Publish SaaS Application.
1.2 Select IDP Routed.
1.3 In the IDP Routed Service Name field, enter your service name (e.g., the name of your app).
1.4 Under Authentication Federation, select SAML as your authentication protocol.
1.5 Enter any placeholder text Redirect URL and Audience URI (e.g., https://dummy.url).
1.6 Attach a Policy of your choice (e.g., High Security).
1.7 Select Register and then Continue. Take note of the SaaSApp Service ID as you will need that in a later step.
The shadow application will show up in the Okta catalog and ensure that a CSE device trust check is complete regardless of an existing Okta session. For these steps, we will use Dropbox as the example SaaS application.
2.1 In Okta, navigate from Applications > Applications.
2.2 Select Create App Integration and choose SAML 2.0.
2.3 In General Settings, name your app (e.g., Dropbox) and upload the relevant app logo.
2.4 In the Configure SAML section, set the following configurations:
2.5 Set the following Attribute Statements:
2.6 In Group Attributes Statements, enter 'Groups' under Name, and select Matches regex as the Filter. Then add ‘ .* ‘ in the field adjacent to the Filter.
2.7 Select Next -> I’m an Okta customer adding an internal app -> Finish
This step is to ensure SP-initiated flows get routed to CSE post authentication with Okta.
3.1 Obtain the Single Sign-On URL from the Shadow App
3.2 Replace the Identity Provider Single Sign-in URL from the original SaaS App with the SSO URL from the Shadow App