Configuring Okta to support Forcepoint ONE SSE as SAML SP

You can configure Okta to support Forcepoint ONE SSE as a SAML Service Provider. You should add Forcepoint ONE SSE as an application inside of Okta and then configure Okta as the external IdP inside of Forcepoint ONE SSE.

Before you begin

You will need access to both the Okta admin portal as well as the Forcepoint ONE SSE admin portal.

Steps

  1. Sign-in to Okta as an administrator.
  2. In the Admin Console, navigate to Applications > Applications and then click Browse App Catalog.


    The Browse App Integration Catalog page opens displaying the all the featured integrations.

  3. In the search field, enter Bitglass to search for the Forcepoint ONE SSE application.


  4. Click the BitGlass from the search results and click Add Integration.


    The General Settings page opens.

  5. On the General Settings page, enter the Application Label for how Forcepoint ONE SSE should be displayed for users and click Done to move on to the next step.


  6. Okta redirects you to assign the application to the appropriate Users.


    You can create Users and groups in Okta by navigating to Directory > Person > Directory > Groups respectively.

  7. Click the Sign On tab and then click the Edit button.
  8. Enter bg_portal_login in the Default Relay State field and click the Save button.


    Note: You may also specify a continue URL in the Default Relay State if you wish to direct the SSO users directly into an app after clicking the Forcepoint ONE SSE button in Okta. The Forcepoint ONE SSE icon can be changed to the app icon in Okta and can used for a single app. To learn about setting up the Default Relay State, refer to the Advanced IdP Settings.
  9. Navigate to Applications > Applications > Forcepoint ONE > Sign On and then click View SAML Setup Instructions.


    A new browser window opens displaying the SAML settings, which are used in Forcepoint ONE SSE setup later.



  10. Log into the Forcepoint ONE SSE portal as an admin, navigate to Protect > Objects > Common Objects and scroll down. Locate the External IdP card and click the green plus icon to add a new IdP.


  11. On the SAML Authentication page, enter an Object Name to recognize the IdP and then select Okta as the IDP Type.


  12. Copy the following details from the Okta Setup Instructions (Step 9) and paste those details into the respective Forcepoint ONE SSE fields.
    1. Copy the SAML IDP Login URL details from OKTA setup page and paste it in the Forcepoint ONE SSE portal under the SAML IDP Login URL field.
    2. Copy the SAML Logout URL details, that is your Okta domain and then /login/signout, from OKTA setup page and paste it in the Forcepoint ONE SSE portal under the SAML IDP Logout URL field. For example, it is https://bitglass3.okta.com/login/signout.
    3. Download the Token Signing Certificate by clicking the Token Signing Certificate link from Okta setup page and then upload the token signing certificate to the Forcepoint ONE SSE portal under the Token Signing Certificate field.


  13. Once you are done, click Save at the top to save the new IdP object.

    If you only have one IdP object configured, that object will be used by default for your domain on the Users and Groups page. If you have more than one IdP, you will need to choose which one is used by default under the domain options or by app instance.

    • To setup the default IdP for the domain, navigate to the IAM > Users and Groups page and select your email domain to open up the options dialog. Make sure that External Identity Provider is selected and then select your IDP object you just created from the drop-down.


    • If you wish to configure IdP individually per app instance, navigate to the Protect > Policies page and select your application that you wish to make changes to. On the application's settings page, select the app instance and in the new dialog select the IdP you just created from the Authentication drop-down.


  14. Test the configuration by opening a new browser window (or incognito window) and attempt to login to https://portal.bitglass.com as one of the Okta assigned users. You should be redirected to the Okta login page where you need to enter credentials before being redirected back to the Forcepoint ONE SSE portal.