Whitespots Wiki
Login
  • Home
  • 🔦Auditor
    • 📥Deployment
      • Installation
      • Update
    • 🎯Features
      • 🚀Run Audit
        • AppSec Portal cooperation
        • Direct use of Auditor
      • ⚙️Settings
        • AppSec Portal cooperation
        • Direct use of the Auditor
          • Cleaner
          • Docker Credentials
          • Workers
          • Personalization
        • Jobs
          • Technical Jobs
          • Scanner Jobs
          • Job configuration
    • 🗒️Release notes
    • 🩼Maintenance
  • 🖥️AppSec Portal
    • 📥Deployment
      • License obtaining
      • Installation
      • Get started with the AppSec Portal
        • Сonfiguration options
      • Update
      • Accessing the AppSec Portal API Endpoints
      • Database transfer guide
      • FAQ: typical errors in deployment process
    • ⚙️Post install Configuration
    • 🎯Features
      • 🎣Auto Validator
        • Rule creation
        • Rules view
      • Deduplicator
        • ⚙️Basic deduplicator rules
        • ⚙️Advance Deduplicator rules
      • 🔦Vulnerability discovery
        • ✔️Audits
        • ⚙️Auditor settings
          • Auditor config
          • Sequences
            • Sequences creating
            • Sequences setting
        • 🔎Run audit
          • Run Audit Manually
          • Scheduled Audit Run
      • 🎯Recommendations
      • Security Metrics
        • Severity Statistics Dashboard
        • WRT (Weighted Risk Trend)
        • How to work with WRT (for team leads)
        • Metrics settings
          • SLA
        • CVSS
          • CVSS Rule
      • Custom Reports
      • 📈Active tasks
      • 🧺Asset management
        • How to import repositories from version control
        • Default product
        • Adding a product asset
        • Asset Transfer Between Products
      • 🕷️Findings view
        • All findings view
        • Grouped findings as a result of
        • Grouping of findings into groups
        • Available bulk actions
        • Viewing specific findings
        • Usable filters and easy sorting
      • 📊Jira
        • Jira integration configuration
        • Setting up Jira webhook
      • 👾Move from DefectDojo
      • 🔬Scanners
        • 🔌Importing reports from scanners to AppSec Portal
          • 🖐️Manual Import using Report File
          • Importing reports via Terminal using a Report File
          • Importing reports via Lambda Function using a Report File
        • Scanner description
          • Code Scanners
            • Bandit
            • Brakeman
            • Checkov
            • CodeQL
            • ESLint
            • Gemnasium
            • Gosec
            • Hadolint
            • KICS
            • PHPCodeSniffer
            • Retire.js
            • Semgrep
            • SpotBugs
            • Terrascan
          • Secret Scanners
            • Gitleaks
            • Trufflehog3
          • Image and code dependency Scanners
            • Trivy
            • Trivy vulners.com plugin
            • Snyk
          • Web Scanners
            • Arachni Scan
            • Acunetix
            • Burp Enterprise Scan
            • OWASP Zap
          • Infrastructure Scanners
            • AWS Security Hub Scan
              • Importing reports via AWS Lambda Function within AWS Security Hub
            • Prowler
            • Subfinder
            • Nessus
            • Nuclei
          • Mobile Security Scanners
            • MobSFScan
          • Other Scanners
            • Dependency-Track
            • Whitespots Portal
      • 📦Working with products
        • Product Creation
        • Product options
        • Finding groups
        • Risk assessment
        • Product Asset
    • 🛠️General Portal settings
      • Version Control Integration
      • Profile
      • Managing user roles and access control
        • User management
        • Creating and editing roles
      • SSO settings
        • GitLab SSO
        • Microsoft SSO
        • Okta SSO
      • Scanner settings
        • Auto Closer
        • Group findings by
        • Custom Jira description
        • Custom severity mapping
        • Auditor Job Config
      • Notification settings
        • Integration
        • Criteria & Schedule
        • Status change notification
        • Manage notification schedule
      • Repository Link Configs
      • CWE list
      • Tag screen
    • 🗒️Release notes
  • To be described
    • Documentation backlog
Powered by GitBook
On this page
  • The setup process will include the following steps:
  • Role Mapping

Was this helpful?

  1. AppSec Portal
  2. General Portal settings

SSO settings

Setting Up Single Sign-On (SSO) in AppSec Portal

PreviousCreating and editing rolesNextGitLab SSO

Last updated 9 months ago

Was this helpful?

If you have a corporate identity provider that supports the OIDC (OpenID Connect) protocol, or if you are using an SSO provider that also works with the OIDC protocol (such as , Auth0, Google Identity Platform, , , Azure AD, AWS Cognito, Duo Security, and others), you can configure Single Sign-On (SSO) for your AppSec Portal.

You can automatically synchronize roles assigned to users in the corporate identity or at your SSO provider .

Authentication through SSO allows users to log in to the portal without the need to remember separate credentials.

The setup process will include the following steps:

  1. Add the "AppSec Portal" application as a client in the settings of your SSO provider.

  1. Navigate to the administrative panel of AppSec Portal: Settings -> Users and Roles -> SSO integrations

  2. On the right panel, select Add SSO (+ SSO)

  3. In the SSO settings section, enter the parameters: Title: Provide a title for the SSO integration. This title will be displayed during the login process. Domain: Enter the domain of your SSO provider. Client ID: Enter the client ID for your SSO connection settings obtained from your provider. Client Secret: Enter the client secret for your SSO connection settings obtained from your provider. Server Metadata URL: If your provider's metadata URL is not unique, you can leave this field with the default value. Scopes: By default, the scope includes the OpenID, email, and profile parameters. You can remove specific parameters if necessary. Use Self-Signed Certificate: Activate this option if it's necessary for your setup. Allowed Email Domains: Enter the allowed email domains as a comma-separated list if necessary. Roles: Choose roles from the dropdown list to be assigned to each user authenticated using this method if necessary.

  4. Click "Create"

  1. Ensure that the authentication and authorization process is functioning correctly, and that users can securely and conveniently access the portal.

Role Mapping

If roles are configured for users in your SSO provider, a specific role will be assigned to the user in the portal based on the configured mapping.

If there are no roles configured in the provider, or if no mapping has been set in the portal, the user is automatically assigned the roles you specified in step 4 during SSO setup.

The mapping check occurs each time a user logs in. In other words, if a role is added or removed for a user on the provider's side, their roles in the portal will be adjusted according to the mapping and newly received information from the provider upon each login.

Follow the steps below to configure the mapping:

  1. Fill the "JSON key in JWT token with list of external groups" field with the name of the key by which the portal is able to get the list of external groups. It could be groups or roles, depending on which system is used

  1. Create a mapping for all external roles

If you have filled in the JSON key in JWT token with list of external groups field but haven't configured the mapping, upon the first login via Single Sign-On (SSO), the portal will display all roles received from your provider. You can map them later.

Click the button and match the role name from your provider and the Portal:

🖥️
🛠️
Okta
Microsoft identity platform
GitLab
by configuring the appropriate mapping
Example for Okta
SSO token example