Configuring Single Sign-on with CyberArk Identity
Overview
CyberArk Identity is one of several Identity Providers that your organization can configure for SSO and use to log in to your Zilla Security tenant.
Scope: Admins
This article covers the following topics:
Prerequisites
Admin account with Zilla Security
SSO has not been configured or existing SSO configuration has been deleted in Zilla settings
System Administrator account with CyberArk Identity
Zilla SAML Provider Setup
Log in as a Zilla admin and click the
Settingstab on the left side of the page. On theDiscovery & Configurationtab, expand theSingle Sign-On Providerdropdown and clickConfigure.
Select
SAMLand clickConfigure.
The
Configure SAMLdialog that will open contains theZilla ACS URLandZilla Entity IDas well as fields to enter theIdP SSO (Single sign-on) URL,IdP Entity ID (Issuer), andIdP X.509 Certificate. Keep theConfigure SAMLdialog open and open another browser tab.
CyberArk Identity Application Setup
Log in to CyberArk Identity as a System Admin.
Expand the
Apps & Widgetsdropdown on the left side of the page and selectWeb Apps.Click
Add Web Apps.Click the
Customtab in the dialog that appears and clickAddto the right of theSAMLoption.
On the
Settingstab of the dialog that appears, configure the application including theName,Description,Category, andLogo. Click here to download the Zilla Security logo.
Click the
Trusttab and ensure thatManual Configurationis selected on the left side of the page.Click to expand the
IdP Entity ID / Issuerdropdown and clickCopynext to the value.
Paste that value into the
IdP Entity ID (Issuer)field in theConfigure SAMLdialog in Zilla.
Expand the
Signing Certificatedropdown and clickDownloadto download a copy of the signing certificate.
Paste the contents of the Signing Certificate file into the
IdP X.509 Certificatefield in Zilla.
Important: When pasting the certificate into the Zilla IDP X.509 Certificate field, remove -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- from the pasted value.
In Cyberark Identity, click
Copynext to theSingle Sign On URLfield.
Paste that value into the
IdP SSO (Single Sign-on)URL field in Zilla.
In Zilla, click
Copynext toZilla ACS URL.
Paste that value into the
Assertion Consumer Service (ACS) URLfield in CyberArk Identity.
In Zilla, click
Copynext toZilla Entity ID (SP Entity ID).
Paste that value into the
SP Entity ID / Issuer / Audiencefield in CyberArk Identity.
Click the
SAML Responsetab, clickAddin theAttributesfield, and map attributes from your source directory to include in the SAML response.
Next, add permissions for the Zilla app in CyberArk Identity so that the admin user can log in. Click the
Permissionstab and clickAdd.
Use the
search barto search for the admin user in the CyberArk Identity directory who will administer Zilla Security and check theboxnext to their user information to select the user.
Click
Add.
Click
Save.
Validation
In the Zilla app, click
Validatein theConfigure SAMLdialog.
After the admin has tested the configuration and validated that it is correct, reviewers, technical owners, or app owners can log in to Zilla to see the apps and reviews they have been assigned using SSO via CyberArk Identity.