Okta

How to Configure SAML 2.0 for Symantec Web Security Service

Contents


Supported Features

The Okta/Symantec Web Security Service SAML integration currently supports the following feature:


Configuration Steps

  1. Copy and save the following as metadata.xml:

    Sign in to Okta Admin app to have this variable generated for you.
  2. Sign in to your Symantec Web Security Service instance as an administrator.

  3. Navigate to Service > Authentication > SAML, then enter the following (see screen shot at end of step for reference):

    • Click Import Metadata to locate and upload the metadata.xml file you saved in step 1.

    • User Attribute: Select NameID.

    • Group Attribute: Enter group.

    • Click Save.

    symantec_1.png

  4. Navigate to Network > Locations, then click Add Location:

    symantec_2.png

  5. Enter the following (see screen shot at end of step for reference):

    • Location Name: Enter a name. We used US in our example.

    • Select an Access Method. We used Explicit Proxy in our example.

    • Enter your IP/Subnet value.

    • Check Enable Captive Portal.

    • Authentication Type: Select SAML.

    • Select one of the options for Estimated Users.

    • Select your Country.

    • Select your Time Zone.

    • Click Save.

    symantec_3.png

  6. Select the SSL Interception tab.

  7. Click Download to download then install the SSL Root Certificate:

    symantec_4.png

  8. In order to pass Okta groups as part of the SAML Response:

    • In Okta, select the Sign On tab for the Symantec Web Security Service app, then click Edit.

    • Select your preferred group filter from the dropdown list (the Regex rule with the value ".*" in order to send *all* groups to the Symantec Web Security Service instance we used in our example).

    • Click Save.

    symantec_5.png

  9. Set your browser proxy to proxy.threatpulse.net:8080.

  10. Add your Okta URL host ([yourSubdomain].okta.com) to the proxy bypass list.

    For example if you log into https://acme.okta.com/; enter acme.okta.com.

    Here is an example, shown in a Firefox browser:

    symantec_6.png

  11. Done!



Notes

The following SAML attribute is supported:

Name Value
group This will be configured in the app UI; see group attribute instructions (step 8) above.

For SP-initiated SSO

Open a required site in your browser.