Configuring Authentication Method for Organization
After creating an organization associated with your SSE or higher edition license keys, you must first select and configure an authentication method to enable users to log into the organization. Zenconsole organization supports 3 authentication methods. You can use one of these methods to allow your gateways or endpoints to register with your organization:
- Google Cloud Identity
- SAML 2.0
- Built-in Authentication (Email & Password)
- Azure AD
One-Time Password support will be available soon.
1. Enabling Google Cloud Identity
To be able to use Google Workspace for identity management in your organization, you must integrate your Zenconsole organization with your Google Workspace. This integration ensures your organization's users and groups are automatically added and updated with regular syncs, keeping all information accurate and current without manual effort.
You may easily enable Google Cloud Identity for your organization and allow users to sign in to the organization using their Google Workspace accounts by following the next steps.
-
Login Zenconsole.
-
Select the organization you want to manage.
-
Navigate to the Settings > Identity & Access Management page.
Figure 1. Identity & Access Management page
-
Go to Authentication Method pane at the top of the page.
-
Click + Add Authentication Method drop-down menu at the top right of the pane. All supported authentication methods will appear.
Figure 2. Selecting Authentication Method
-
Click Google Cloud Identity option to configure Google Workspace as the organization authentication method. This will pop up the Google Cloud Identity configuration wizard window.
-
Type the domain that you want to be synchronized with Zenconsole for user authentication. Users with email addresses from these domains can sign in to your organization.
Figure 3. Adding Accepted Domains
-
Click + Add Domain button. You may add as many domains as you need. Accepted domains will be automatically displayed below. You may quickly remove them by clicking the
xicon next to the domain name if you need.Figure 4. Accepted Domains
-
Click Continue to proceed with the Google Cloud Identity configuration. This will provide a link for the Google Cloud Identity integration and await authorization from your domain administrator.
Figure 5. Generating Link and Waiting for Google IDP Authorization
-
You may either click on the link if you have administrator privileges for your domain or copy it to share it with domain administrators. So that Zenconsole will be able to access your Google Workspace and synchronize with user accounts.
-
Go to the link generated in the previous step and sign in to Google using an account with admin privileges.
Figure 6. Signin Google with Admin Account
-
Click Allow to give the required privileges on your domain to Zenconsole.
Figure 7. Accepting Permission Requests
-
You should observe that Zenconsole access has been granted to your domain. Zenconsole will now routinely update your users and groups, as they are now synchronized.
Figure 8. Google Access Granted
-
Click on the Zenconsole link which will redirect you to the organization Identity & Access Management page. You should see that Google is set Default authentication method for your organization.
Figure 9. Google Default Authentication Method
Beware that to let your domain users sign in to the organization, you will need to approve them by navigating to the Users settings page.
2. Enabling Generic SAML 2.0
You may use any identity provider, like Google or Okta, that supports SAML 2.0 single sign-on (SSO) authentication protocol as an identity provider for your organization. If you prefer to use SAML 2.0 protocol as your organization's authentication method, you must follow the next steps:
- Select an identity provider such as Okta that supports SAML 2.0 protocol.
- Create a SAML application on IdP provider and download the metadata file.
- Import the SAML IdP metadata file to your Zenconsole organization.
In this section, you will find the details about enabling SAML 2.0 and downloading the IdP metadata file on both service providers, Google and Okta. Lastly, we will explain how you can import SAML metadata to your organization on Zenconsole.
Beware that when you use the SAML 2.0 authentication method for your organization, you must add users and groups to the organization manually. On the other hand, if your organization has Google Workspace and you integrate Zenconsole organization with Google Cloud services as described in the previous section, all users and groups are automatically fetched and regularly synced.
Creating SAML2 IdP Metadata using Google Workspace
You may easily create an application and download IdP metadata on Google Workspace for your organization by following these steps:
-
Sign in to your Google Admin console.
-
In the Admin console, Navigate to Apps > Web and mobile apps on the left-side bar.
Figure 10. Google Web and Mobile Apps
-
Click Add app drop down menu and then select Add custom SAML app.
Figure 11. Adding Custom SAML App
-
Enter App Name, such as
Zenarmor. -
Optionally you may type Description and add an icon for the app.
-
Click Continue.
Figure 12. Google SAML App Details
-
Click Download Metadata button to download the IdP metadata file.
Figure 13. Downloading Google IDP Metadata
-
Click on the Save button to download the Google iDP metadata file in
xmlformat to your local disk. -
Click Continue.
-
Enter ACS URL, such as
https://dash.zenarmor.com/saml/{domain}. -
Enter Entity ID, such as
https://dash.zenarmor.com/saml/{domain} -
You may leave Name ID format and Name ID as default.
Figure 14. Google iDP Service Provider Details
-
Click Continue
-
You may skip Attribute Mapping settings and, click Finish.
Figure 15. Google Attribute Mapping
-
Click on the User access pane.
Figure 16. Google view saml conf
-
Set Service status to ON for Everyone.
Figure 17. Setting Google Service Status
-
Click Save to activate settings.
Your Google IdP SAML 2.0 configuration is ready to use.