Azure AD with CTSP
ColorTokens ZTNA is an Azure gallery app available on the Azure Marketplace. Integrating the ColorTokens ZTNA app with your Azure AD tenant and federating between the Azure AD and Xshield tenants can provide you the following benefits:
- ZTNA with SAML-based SSO to Xshield-protected apps - a successful integration of ColorTokens ZTNA Azure app with Xshield ensures Zero Trust network access to and from endpoint assets after Xshield policies are enforced. Also, Xshield-protected apps can be SSOed to using SAML without needing to enter the login credentials multiple times.
- Improved secure network access to Xshield-protected apps - use Azure AD authentication features such as Multi-factor authentication (MFA), Conditional Access, and Session Control, in addition to enforcing Xshield policies on endpoint assets.
Pre-requisites
- An Azure AD subscription or an on-premises Active Directory setup with Azure AD Connect installed and on-premises users and user groups synchronized with Azure AD.
Xshield agents (type = User Authorization) installed on the assets that the Azure AD tenant's users will use.
Read Install Xshield agent for more on installing Xshield agents on assets.
- Decide on the users and/or user groups in the Azure AD tenant who must be able to SSO with Xshield-protected apps.
Limitations
- Using the ColorTokens ZTNA app for SSO is an Xshield tenant to Azure AD tenant mapping. This works only for a unique combination of Xshield and Azure AD tenants.
- For Xshield deployments that have been in use for a few releases, if SAML-based authentication with Azure AD is already configured, you must overwrite the existing federation data with the federation data of the ColorTokens ZTNA app.
Procedure
Download the federation metadata of the Xshield tenant
The federation metadata for Xshield is an XML file. You will need to feed this metadata to configure ColorTokens ZTNA integration on Azure AD.
|
Add ColorTokens ZTNA app to your Azure AD tenant from Microsoft Azure Marketplace
Add the ColorTokens ZTNA app to your Azure AD tenant to enable SAML-based SSO to Xshield-protected apps.
Although you can manually specify the URLs, user attributes and claims, and other properties for the ZTNA app, we strongly recommend you use the federation XML file from Xshield to auto-populate these properties on Azure AD.
|
Add Azure AD users and/or groups who can SSO with Xshield-protected apps
Only users and/or groups you select here will be able to SSO with Xshield-protected apps. It is important that you maintain meaningful and intuitive groups on Azure AD. By mapping the groups on Azure AD with Endpoint groups on Xshield, you can enforce Xshield policies on Endpoint groups efficiently.
|
Upload ColorTokens ZTNA app's federation data to the Xshield tenant
This creates a trust relationship between Azure AD/ColorTokens ZTNA app, and Xshield.
|
Xshield | Azure AD |
First Name | givenname |
Last Name | surname |
Group | Azure AD groups (the name of the manually added group claim) |
Department | department |
Download and install Xshield agents on endpoint assets
This is needed to bring the endpoint assets under active management from Xshield and to enforce ZTNA with Xshield policies on them.
Download Xshield agents (Agent Type = User Authorization) for Windows and macOS endpoint assets, from the Settings > Agent & Downloads > Agent Download page on Xshield. Read Install the agent one-at-a-time and Install the agents at scale to see how to install the agent. |
Verify federation with the ColorTokens ZTNA app and Xshield
If the federation between the Azure AD/ColorTokens ZTNA Azure app and Xshield is successful:
- You must see the 'Groups and 'Departments' attributes from Azure AD synchronized with Xshield, on the Assets & Groups > Users, Groups & Departments page.
- You will see the endpoint users/assets (selected to use SSO with ColorTokens ZTNA app) on the Assets & Groups > Users, Groups & Departments page, when they successfully log in from the ColorTokens endpoint app on the assets, by using the Microsoft credentials.
Next steps
Group endpoint assets by their access requirements. Create Endpoint groups by the groups and/or departments synchronized from Azure AD.
For example, 'HR' and 'Customer relationship' Endpoint groups with users from the respective Azure AD groups and departments.
Read Endpoint groups for more details.
Create and enforce Access policies between Endpoint groups and Workload groups (that host the apps to which SSO is needed).
For example, Access policies between 'HR' Endpoint group and 'Web' role workloads in the HRM Workload group, and Access policies between 'Customer relationship' Endpoint group and the 'Web' role workloads in the CRM Workload group.
Enforce Xshield policies between these Endpoint groups and other HR and Customer relationship related apps to enjoy true SSO access.
Read Access policies for more details.