Authenticate users using SSO

Supported in:

This document describes how to configure a SAML provider with one of these use cases:

After you configure the SAML provider, you can authenticate users in the Google SecOps SOAR platform, as follows:

  1. Go to SOAR Settings > Advanced > External Authentication .
  2. On the Provider page, click add Add .
  3. In the Provider Type field, select the required SAML provider. For example, Okta or Google Workspace .
  4. In the Provider Name field, enter the name of the instance. For example, Okta Customer name .
  5. Set the Configuration settings using the following details:
    Field
    Description
    Provider name
    Name of the SAML provider.
    IDP Metadata
    SAML metadata that shares configuration information between the Identity Provider (IdP) and the Service Provider (SP). If you use a certificate, set WantAuthnRequestsSigned="true" in the XML; otherwise, set it to false .
    Identifier
    The SP ID in the SAML provider. This term is referred to as Entity ID in Google Workspace, though service providers can use different names.
    ACS URL
    Google SecOps SOAR server name. Can be an IP URL, Hostname URL, or Local Host URL.
    To sign in with SAML, you must do the following:
    1. Connect to the platform with the same URL pattern as configured in this field.
    2. Make sure that the URL contains the IP address of the Google SecOps SOAR server, followed by /saml2 .
    Unsolicited Response
    This setting is also known as an IdP-Initiated response . It lets SAML users access the Google SecOps SOAR platform directly from their IdP application. For example, if your company uses Okta, users can enter Google SecOps SOAR directly through the Okta application.
    Auto-redirect
    Auto-redirect automatically sends users who aren't signed in to the IdP login page. To force a user to sign in to the platform directly, append ?autoExternalLogin=false to the URL. Example: https://example.com/#/login?autoExternalLogin=false .
  6. Click Test to verify that the configuration works.
  7. Click Save .
  8. Select one of the user creation types as needed:
    • Manual : Add users, individually, in the User Management window. For details on how to add users, see Manage users .
    • Just in Time : Automatically create the user (at login) in Google SecOps. When you select this option, an advanced tab opens with more parameters. For details, see Configure just-in-time provisioning .
    • IdP Group Mapping : Create the user automatically in Google SecOps based on the IdP group assignment. When you select this option, an advanced tab opens with more parameters. For more information on IdP group mapping, see Map IdP groups to SOAR roles .

Need more help? Get answers from Community members and Google SecOps professionals.

Create a Mobile Website
View Site in Mobile | Classic
Share by: