Once you added (or synced) the SDP users and groups to your account, you can then determine how they will authenticate and be allowed to access the network. The different authentication options let you meet the security requirements of your also organization while at the same time providing the best experience for the end-users.
Some of the authentication options and settings are controlled in the Cato Management Application and Cato Cato User Portal. For Single Sign-On (SSO), the user data and passwords are managed in the Identity Provider (IdP) portal or console, and the SSO token behavior is configured in the Cato Management Application.
These are the different authentication methods that Cato supports for end-users to connect to the Cato Cloud:
-
Authentication options managed in the Cato Management Application and User Portal:
-
Password
-
Multi-Factor Authentication (MFA)
-
-
Authentication option managed in the Cato Management Application:
-
Registration Code
-
-
Authentication options managed in the Cato Management Application and IdP:
-
SSO
-
This section explains the different authentication methods you can use for SDP users.
Users managed in the Cato Management Application can authenticate with a password that authenticates to the Cato Cloud. They create their own passwords, and can reset the password in the User Portal. Admins can also reset the password from the Cato Management Application.
When the user attempts to connect with the Client, they must enter their password into the Client to authenticate and then connect to the network.
For more about authenticating with passwords, see Working with Users.
You can choose to require a second authentication factor for users managed in the Cato Management Application, and enable MFA for the entire account or for specific users. Cato supports these MFA methods:
-
Authentication app that generates temporary codes (such as Google Authenticator)
-
SMS codes
You can configure your account to support one or both methods. For accounts that support both methods, users log in to the User Portal and select the MFA method.
When the user attempts to connect with the Client, they must authenticate with their password and then enter the MFA code in the Client.
For more about using MFA, see Configuring the Authentication Policy for Cato Clients.
You can use the Cato Management Application to generate a CSV file with codes that are used to authenticate to the Client. After a user successfully authenticates with the code, they are not required to authenticate again.
For more about using registration codes, see Activating Users with a Registration Code.
Cato supports user authentication using OIDC to enable seamless SSO with your existing Identity Provider (IdP) authentication mechanism. Additionally, you can leverage MFA capabilities of SSO providers to enhance the security of user authentication.
Supporting SSO provides you with greater security and compliance, consistent user authentication, improved usability and satisfaction and lower IT costs. OIDC offers simplicity and is increasingly becoming popular for user authentication in modern applications.
Cato supports SSO with these IdPs:
-
Azure
-
Okta
-
Google
-
OneLogin
-
OneWelcome
-
PingFederate
For more about IdPs and Cato, see: Using an Identity Provider for Your Cato Account.
For more about configuring SSO, see the KB articles in this section.
0 comments
Please sign in to leave a comment.