3 KiB
Conditional access: Okta
With Fleet, you can integrate with Okta to enforce conditional access on macOS hosts.
When a host fails a policy in Fleet, IT and Security teams can block access to third-party apps until the issue is resolved.
Conditional access with Okta requires changing the Fleet infrastructure (new redirect). Instructions are coming soon.
Step 1: Deploy user scope profile
- In Fleet, go to Settings > Integrations > Conditional access > Okta and click Connect.
- In the modal, find the read-only User scope profile.
- Copy the profile to a new
.mobileconfigfile and save. - Follow the instructions in the Custom OS settings guide to deploy the profile to the hosts where you want conditional access to apply.
Step 2: Download certificate for Okta
- In Fleet, go to Settings > Integrations > Conditional access > Okta and click Connect.
- In the modal, go to Identity provider (IdP) signature certificate. Click Download certificate.
Step 3: Create IdP in Okta
- In the Okta Admin Console, go to Security > Identity Providers.
- Click Add Identity Provider.
- Select SAML 2.0 IdP.
- Set Name to "Fleet".
- Set IdP Usage to Factor only
- Set IdP Issuer URI, IdP Single Sign-On URL, and Destination to [TODO]
- For IdP Signature Certificate, upload the IdP signature certificate downloaded from Fleet.
- After saving, you'll see the Fleet IdP listed in Security > Identity Providers.
Step 4: Configure Okta settings in Fleet
Once you've created the identity provider in Okta, you'll need to copy its values into your Fleet settings.
- In Fleet, go to Settings > Integrations > Conditional access > Okta and click Connect.
- Copy the IdP ID from Okta to the IdP ID field.
- Copy the Assertion Consumer Service URL from Okta to the Assertion consumer service URL field.
- Copy the Audience URI from Okta to the Audience URI field.
Step 5: Configure conditional access policies
Once Okta is configured in settings, head to Policies. Select the team that you want to enable conditional access for.
- Go to Manage automations > Conditional access and enable conditional acccess.
- Select the policies you want to block login via Okta.
- Save.
Disabling Okta conditional access
You can delete conditional access configuration on Fleet's side from Settings > Integrations > Conditional access > Okta and clicking the delete button.
To fully disable conditional access, you will also need to disable it on the Okta side. Instructions are coming soon.