Skip to main content
Version: 2.16.0

Single Sign-On

Glasswall Halo can be configured to enable Single Sign-On (SSO) with OpenID Connect (OIDC).

SSO is an authentication method that allows users to sign in using one set of credentials to multiple independent software systems. Using SSO means a user doesn't have to sign in to every application they use.

Below is information on how to configure SSO within your Glasswall Halo solution using Microsoft Entra ID as the identity and access management (IAM) provider.

In principle, any IAM solution that offers OIDC may be configured to support SSO for Glasswall Halo.

Prerequisites for Microsoft Entra ID integration

  • A Microsoft enterprise agreement for a Microsoft Entra ID account is required to enable this SSO option.
  • A domain name must be configured for the Halo portal (portal service) to use SSO authentication.
  • Azure App Registrations are required whenever SSO authentication using Microsoft Entra ID needs to be enabled.
  • Three App Registrations must be created:
    • Cdrplatform-API-access
    • Cdrplatform-portal-access
    • Cdrplatform-portal-client
  • The attached shell script helps create these app registrations. Enter the domain name you would like to use for the portal as an argument to the script. Example:
bash create-azure-app-registrations.sh halo.glasswall.com
  • The enterprise application ar-Halo-portal-client must be granted admin consent.

Configuration

Enable Microsoft Entra ID API authentication

To enable Microsoft Entra ID based authentication, set configuration.authenticationscheme=bearer. Also set tenant_id and portal_domain variables while deploying the Helm chart.

Note: The URI for the App Registration may vary depending on when it was created. Always copy the exact App Registration URI from the Azure portal and use it as the valid audience value.

tenant_id=""
portal_domain=""
valid_audiences="api://cdrplatform-api-access" # or "api://${tenant_id}/cdrplatform-api-access"
helm upgrade --install cdrplatform-portal-access cdrplatform-portal-access   --set image.repository=glasswallhub.azurecr.io/cdrplatform-portal-access   --set image.tag=144773   --set ingress.tls.enabled=true   --set ingress.tls.domain=${portal_domain}   --set ingress.tls.secretName=tls-secret   --set configuration.AuthenticationScheme=Bearer   --set configuration.Authentication__Schemes__Bearer__ValidAudiences__0=${valid_audiences}   --set configuration.Authentication__Schemes__Bearer__ValidIssuer=https://sts.windows.net/${tenant_id}/   --set configuration.Authentication__Schemes__Bearer__Authority=https://login.microsoftonline.com/${tenant_id}/v2.0/   --atomic

Configure SSO login for Glasswall Halo

Set portal_domain, portal_client_id, tenant_id variables in the commands below.
portal_domain is the domain used for TLS on the portal service and is also the domain used in the cdrplatform-portal-client App Registration.

portal_client_id is the application (client) ID of the cdrplatform-portal-client App Registration.

enabled_pages should be set to:

  • systemsettings\,policysettings\,validationsettings when Policy API is deployed
  • Otherwise: enabled_pages="systemsettings"
portal_domain=""
portal_client_id=""
tenant_id=""
enabled_pages="SystemSettings\,PolicySettings\,ValidationSettings"
helm upgrade --install cdrplatform-portal cdrplatform-portal   --set image.repository=glasswallhub.azurecr.io/cdrplatform-portal   --set image.tag=156623   --set ingress.tls.enabled=true   --set ingress.tls.domain=${portal_domain}   --set ingress.tls.secretName=tls-secret   --set configuration.BackendUrl="https://${portal_domain}"   --set configuration.EnabledPages=${enabled_pages}   --set configuration.OIDC.ProviderOptions.Authority="https://login.microsoftonline.com/${tenant_id}/v2.0"   --set configuration.OIDC.ProviderOptions.RedirectUri="https://${portal_domain}/authentication/login-callback"   --set configuration.OIDC.ProviderOptions.ClientId="${portal_client_id}"   --set configuration.OIDC.ProviderOptions.PostLogoutRedirectUri="https://${portal_domain}/authentication/logout-callback"   --atomic

Next, the portal access service needs to enable SSO authentication using Microsoft Entra ID.

Set tenant_id and portal_domain variables below:

tenant_id=""
portal_domain=""
helm upgrade --install cdrplatform-portal-access cdrplatform-portal-access   --set image.repository=glasswallhub.azurecr.io/cdrplatform-portal-access   --set image.tag=156541   --set ingress.tls.enabled=true   --set ingress.tls.domain=${portal_domain}   --set ingress.tls.secretName=tls-secret   --set configuration.AuthenticationScheme=Bearer   --set configuration.Authentication__Schemes__Bearer__ValidAudiences__0=api://cdrplatform-portal-access   --set configuration.Authentication__Schemes__Bearer__ValidIssuer=https://sts.windows.net/${tenant_id}/   --set configuration.Authentication__Schemes__Bearer__Authority=https://login.microsoftonline.com/${tenant_id}/v2.0/   --atomic

User roles

To assign roles to portal users

  1. Navigate to the enterprise application titled ar-cdrplatform-portal-access within Microsoft Entra ID.

Note: The screenshots use ar-cdrplatform-perf-portal-access as an example.

Sso_1 Sso_2

  1. Navigate to the Users and groups section and select Add user/group.

Sso_3

  1. Select the desired user or group, then choose the appropriate role.

Sso_4 Sso_5

  1. Click Assign.

Sso_6 Sso_7


To assign roles to API users