From 291573fbc5026b18fd417bc129547b25419a31a2 Mon Sep 17 00:00:00 2001 From: Nate Brady <60442246+terratrax@users.noreply.github.com> Date: Tue, 13 Dec 2022 05:21:13 -0600 Subject: [PATCH] website/integrations: Add docs for Skyhigh (#3890) * Add Skyhigh Security documentation * Add Skyhigh to infrastructure application menu * Add Skyhigh to infrastructure application menu * fix linting Signed-off-by: Jens Langhammer Signed-off-by: Jens Langhammer Co-authored-by: Jens Langhammer --- .../integrations/services/skyhigh/index.md | 98 +++++++++++++++++++ website/sidebarsIntegrations.js | 1 + 2 files changed, 99 insertions(+) create mode 100644 website/integrations/services/skyhigh/index.md diff --git a/website/integrations/services/skyhigh/index.md b/website/integrations/services/skyhigh/index.md new file mode 100644 index 000000000..519f99711 --- /dev/null +++ b/website/integrations/services/skyhigh/index.md @@ -0,0 +1,98 @@ +--- +title: Skyhigh Security +--- + +Support level: Community + +## What is Skyhigh Security + +:::note +Skyhigh Security is a Security Services Edge (SSE), Cloud Access Security Broker (CASB), and Secure Web Gateway (SWG), and Private Access (PA / ZTNA) cloud provider. +::: + +From https://www.skyhighsecurity.com/en-us/why-skyhigh/why-skyhigh.html + +:::note +We were among the first to recognize the cloud’s potential and knew that protecting data in this new hybrid world required an entirely new approach. We make managing your web and unifying your data policies easy to create and enforce, giving you a single console to provide visibility across all of your infrastructure. +::: + +## Multiple Integration Points + +Skyhigh has multiple points for SAML integration: + +- Dashboard Administrator login - Allows you to manage the Skyhigh Security dashboard +- Web Gateway and Private access - Authenticates for Internet access and ZTNA/Private access + +The following placeholder will be used throughout this document. + +- `authentik.company` is the FQDN of the authentik install. + +## Integration for Dashboard Administrator login + +### Configure Skyhigh Security + +While logged in to your Skyhigh Security Dashboard, click the configuration gear and navigate to `User Management` -> `SAML Configuration` -> `Skyhigh Cloud Users` tab + +Under the `Identity Provider` section enter the following values (replace `` with the name of the application slug you will use): + +- Issuer: `https://authentik.company/skyhigh-dashboard` +- Certificate: Upload the signing certificate you will use for the Authentik provider +- Login URL: `https://authentik.company/application/saml//sso/binding/init/` +- SP-Initiated Request Binding: HTTP-POST +- User exclusions: Select at least one administrator account to login directly (in case something goes wrong with SAML) + +Press `Save` + +Note the Audience and ACS URLs that appear. You will use these to configure Authentik below + +### Configure Authentik + +In the Authentik admin Interface, navigate to `Applications` -> `Providers`. Create a SAML provider with the following parameters: + +- ACS URL: Enter the ACS URL provided by the Skyhigh Dashboard above +- Issuer: `https://authentik.company/skyhigh-dashboard` +- Service Provider Binding: `Post` +- Audience: Enter the Audience URL provided by the Skyhigh Dashboard above +- Signing certificate: Select the certificate you uploaded to Skyhigh above +- Property mappings: Select all default mappings. +- NameID Property Mapping: `Authentik default SAML Mapping: Email` + +Create an application linked to this new provider and use the slug name you used in the Skyhigh section above. + +## Integration for Web Gateway and Private Access + +### Configure Authentik + +In the Authentik admin Interface, navigate to `Applications` -> `Providers`. Create a SAML provider with the following parameters: + +- ACS URL: `https://saml.wgcs.mcafee-cloud.com/saml` +- Issuer: `https://authentik.company/skyhigh-swg` +- Service Provider Binding: `Post` +- Audience: `https://saml.wgcs.mcafee-cloud.com/saml` +- Signing certificate: Select any certificate +- Property mappings: Select all default mappings. + +Create an application linked to this new provider and note the name of its slug. + +### Configure Skyhigh Security + +While logged in to your Skyhigh Security Dashboard, click the configuration gear and navigate to `Infrastructure` -> `Web Gateway Setup`. + +Under the `Setup SAML` section click the `New SAML` button. + +Configure your SAML provider as follows (replace `` with the name of your slug): + +- SAML Configuration Name: Enter a descriptive name here +- Service Provider Entity ID: `https://saml.wgcs.mcafee-cloud.com/saml` +- SAML Identity Provider URL: `https://authentik.company/application/saml//sso/binding/post/` +- Identity Provider Entity ID: `https://authentik.company/skyhigh-swg` +- User ID Attribute in SAML Response: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress` +- Group ID Attribute in SAML Response: `http://schemas.xmlsoap.org/claims/Group` +- Identity Provider Certificate: Upload the certificate you selected in the Authentik SAML provider you created earlier +- Domain(s): Enter the email domain(s) you wish to redirect for authentication to Authentik + +Save your changes and publish the web policy. + +:::note +You must also ensure that your web and/or private access policies grant access to users who will be authenticated. This configuration is out of scope for this document. +::: diff --git a/website/sidebarsIntegrations.js b/website/sidebarsIntegrations.js index 82c8d7484..17e4a96e9 100644 --- a/website/sidebarsIntegrations.js +++ b/website/sidebarsIntegrations.js @@ -78,6 +78,7 @@ module.exports = { "services/truecommand/index", "services/sssd/index", "services/veeam-enterprise-manager/index", + "services/skyhigh/index", ], }, {