Overview
As of March 2021, Cato offers Single Sign-On (SSO) support for these types of users:
- Cato Management Application admins (configured in Access > Single Sign-On)
- Clientless SDP users (configured in Access > Single Sign-On)
- Client SDP (VPN) users (configured in Global Settings > VPN Settings > Single Sign-On)
To simplify and improve our support for SSO, we are unifying the SSO provider settings for VPN users to the Access > Single Sign-On window.
This article lists the different scenarios to help customers understand the process to migrate the SSO settings for Azure and Okta as the Identity Provider (IdP) for the account.
Okta Users
The following table lists each scenario according to the Okta IdP for Client and Clientless SDP, and actions required to ensure consistency of service. The SSO settings for Cato Management Application admins are the same as Clientless SDP users.
VPN SSO |
Clientless SDP SSO |
Actions Required |
Comments |
Disabled |
Disabled |
|
|
Okta |
Okta |
|
|
Okta |
Disabled |
|
|
Okta Allowed Domains
When you use Okta as the IdP for SSO, you set the domains that are allowed to log in to Cato in the VPN Settings > Single Sign-On window.
Cato will automatically migrate these settings to the Access > Single Sign-On window and combine the Allowed Domains for VPN and Access SSO.
Okta Group Settings
Until now, there are different Cato apps in Okta for Client and Clientless SDP to provide SSO. If you have different groups for the Client (VPN) and the Clientless SDP app, the settings for the Clientless SDP app will take precedence after the migration.
Important: Before the migration, make sure that the groups in the Client (VPN) Cato app are the same as the Clientless SDP Cato app. Otherwise, there may be can be authentication errors and possible security risks.
Okta - Manually Migrating to Unified SSO
For accounts that configured Okta as an IdP only for VPN SSO, we cannot automatically migrate the VPN SSO settings to the Access > Single Sign-On window. These accounts will continue to use the legacy VPN Settings > Single Sign-On window for the Okta settings.
The Allowed Domain settings are migrated to the Access > Single Sign-On window.
We recommend that you transfer all the VPN users to the Cato app that is available in the Okta marketplace. For more information, see Configuring Okta SSO for Your Account.
Then you can contact Support to remove the legacy VPN Settings > Single Sign-On window.
Azure Users
The following table lists each scenario according to the Azure IdP for Client and Clientless SDP, and actions required to ensure consistency of service. The SSO settings for Cato Management Application admins are the same as Clientless SDP users.
VPN SSO |
Clientless SDP SSO |
Actions Required |
Comments |
Disabled |
Disabled |
|
|
Azure |
Azure |
|
|
Azure |
Disabled |
|
|
Azure |
Azure (no consent for SDP SSO) |
|
|
Azure Group Settings
Until now, there are different Cato apps in Azure for Client and Clientless SDP to provide SSO. If you have different groups for the Client (VPN) and the Clientless SDP app, the settings for the Clientless SDP app will take precedence after the migration.
Important: Before the migration, make sure that the groups in the Client (VPN) Cato app are the same as the Clientless SDP Cato app. Otherwise, there may be can be authentication errors and possible security risks.
Azure - End Users Authenticate to an SSO Window
In addition, when attempting to either connect to the User Portal (MyVPN) or SDP client using Azure SSO, your users will be presented with an additional Azure authentication step. Users are now required to enter their Cato email address in a pop-up window, as shown below:
Migrating the VPN SSO Settings
The migration process automatically copies the SSO settings for the IdP from the VPN Settings > Single Sign-On window to the Access > Single Sign-On window. No interaction is required on your part.
No Consent for Azure SDP
Some accounts selected Azure as the SSO provider in the Access window but never logged in to Azure to authorize access for Cato. In this scenario, the account impact is the same as if SDP SSO was disabled.
Comments
0 comments
Please sign in to leave a comment.