Set up an identity provider
Now set up an identity provider. The ZTNA gateway authenticates users based on records held by the identity provider.
The steps depend on which provider you want to use.
If you're setting up Okta as an identity provider, your ZTNA gateway must be version 1.1 or higher.
You can use Microsoft Entra ID (Azure AD) for user synchronization and as an identity provider.
Make sure you've already set up Microsoft Entra ID (Azure AD) user groups and synced them with Sophos Central.
- Sign in to Sophos Central.
-
In the left menu, select ZTNA.
-
In Zero Trust Network Access, do as follows:
- In the left menu, select Identity Providers.
- Click Add identity provider.
-
Enter your identity provider settings as follows:
- Enter a name and description.
- In Provider, ensure Microsoft Entra ID (Azure AD) is selected.
-
Enter the Microsoft Entra ID (Azure AD) settings for Client ID, Tenant ID, and Client secret.
If you set up Microsoft Entra ID (Azure AD) as described in this guide, you gathered these settings when you created the tenant. See Set up directory service.
-
Click Test Connection and make sure the connection is made.
- Click Save.
Before you can use Okta as your identity provider, you must create and configure a new Okta app integration with the right settings for use with ZTNA.
To do this, you do as follows:
- Create an app integration.
- Add the identity provider to ZTNA.
We assume here that you have user groups in Okta. If you don't, use Okta's tools to synchronize groups from your directory service to Okta. Make sure you've also synchronized your groups with Sophos Central.
Create an app integration
-
In the Okta dashboard, go to Applications.
-
Click Create App Integration.
-
In Create a new app integration, do as follows:
- Select OIDC.
- Select Web Application.
-
In OpenID Connect ID Token, do as follows:
- Click Edit.
- Add a Groups claim expression.
- Click Save.
-
In New web application integration, do as follows:
- Enter a name.
- Select Client credentials.
- Select Refresh token.
-
On the same tab, in Sign-in redirect URI, enter the address where Okta will send the authentication response and token. This must be the gateway host FQDN followed by /oauth2/callback. For example:
https://ztna.mycompany.net/oauth2/callback
-
In Assignments, select Skip group assignments for now.
-
Open your new application. On the General tab, make a note of the Client ID and Client Secret. You'll need them when you set up Okta as your identity provider in Sophos Central.
-
On the Okta API Scopes tab, set the permissions that are needed:
- okta.groups.read
- okta.idps.read
You only need okta.idps.read if you're using AD Sync.
-
On the Assignments tab, click Assign > Assign to groups. Select your existing group of users.
Add the identity provider to ZTNA
-
Sign in to Sophos Central. In the left menu, select ZTNA.
-
On the Zero Trust Network Access page, do as follows:
- In the left menu, select Identity Providers.
- Click Add identity provider.
-
Enter your identity provider settings as follows:
- Enter a name and description.
- In Provider, select Okta.
-
Enter the Okta settings for Client ID, Client secret, and Issuer URI.
These are the Okta settings noted earlier.
-
Click Test Connection and make sure the connection is made.
- Click Save.
Next, you set up a gateway.