API & Integrations - OKTA Evidence Based Controls

This article contains information on integrating Okta Evidence Based Controls with Mimecast to enhance security by identifying and managing risky internal users, through email threat detection and group management within Okta. It is intended for Administrators.

Okta Evidence Based Controls integration makes it possible to identify, alert, and manage risky internal users. Whether the intention is malicious or benign, perpetuating malicious attachments, URLs, or restricted information outside of the organization can have damaging effects on reputation and compromise business partners. Mimecast provides an additional layer of essential security against malicious activity and coupled with Okta’s identity management capabilities, mutual customers achieve an increased security posture.

Overview

Outbound emails are received by Mimecast and are subject to analysis by the Mimecast inspection funnel, where a series of advanced security scanning techniques are applied ensuring emails are safe before they are delivered to the recipient. If the email has been scanned and there are threats detected by Mimecast Targeted Threat Protection, the sending user's group membership within the Okta platform is updated as per the integration’s configuration. The Okta Groups contain Internal senders implicated with one or more enabled event types; appropriate measures should be in place and applied to the Okta Groups to mitigate the risk posed by internal senders.

Benefits

Okta Evidence Based Controls integration provides the following benefits:

  • The additional layer of security provided by Mimecast protects your organization from email-based threats sent from internal users.
  • Provides enhanced email threat detection efficacy with risky internal users being shared by Mimecast Email Security Cloud Gateway with Okta.
  • Exposes internal threats and risks within your organization.

Prerequisites

Before you attempt to configure Okta Evidence Based Controls, ensure the following prerequisite tasks are met:

The action set in the Content Examination definition is not considered by the integration. For example, if the action is set to Delete or Bounce, the integration will still trigger the Okta Group membership update. Content Examination should be tested with the integration using a narrow scope (small group of test users) to identify any false positives that should be addressed before widening the scope of the integration to include non-test users.

  • An Okta organization:
    • User logins should match the users primary email address.
    • An Okta app created for the integration using the Okta App Integration Wizard. See the Create custom app integrations page from Okta for more information.

Okta Administration Console

The Administrator running this task must have at least one of the following roles:  

  • Super admin for the Okta org.
  • App admin for the Okta org.

Create App integration

You can create an App integration within the Okta Admin Console, by using the following steps:

  1. In the Admin Console, navigate to Applications | Applications.
  2. Using the action buttons on this page, click on Create App Integration.
  3. Select the API Services radio button.
Create New Okta Integration
  1. Set a name for the new App integration.
New API Services Integration
  1. Click on Edit link.
Mimecast Evidence Based Controls
  1. Set the Client authentication setting within the Client Credentials section to the Public key / Private key option.
Mimecast Evidence Based Controls Client Credentials
  1. Click on Add Key  within the Public Keys section, followed by the Generate new key link that appears in the Add a public key dialog box.
Add a public key
  1. Click on the Copy to clipboard link that appears above the private key.
Copy private key
  1. Save the Private Key in a safe and secure location. The Private Key is required to update the integrations configuration with the Mimecast Administration Console.

Okta Admin Console Integrations – Important Steps

Please ensure the following actions are completed in your Okta Admin Console when configuring integrations:

  • Disable the DPoP Option: If the DPoP (Demonstrating Proof-of-Possession) option is enabled for your integration, please disable it.
  • Assign Administrator Roles to the Application: Make sure to assign the appropriate administrator roles to your application to ensure proper access and management.

Note:
These steps are essential for maintaining secure and effective integrations.

To prevent unauthorized changes to the configuration, access to the Private Key should be restricted to Okta Super Admins or highly trusted System Administrators or your security team should be the custodians of the private key.

  1. Click on Done.
  2. Click on Save.

Save Mimecast Evidence Based Controls

  1. Confirm the action within the dialog box, by clicking on Save.
Confirm existing client secrets will no longer be used
  1. Okta app for the integration should now be created successfully.
Okta app integration created successfully
  1. Copy the Client ID and save this to safe and secure location, as this will be required to configure the integration via the Mimecast Administration Console.
  2. Finally, click on the Okta API Scopes tab and grant the below API scopes:
    1. okta.groups.manage
    2. okta.groups.read
    3. okta.users.read
Okta API Scopes
  1. The Okta app configuration is now complete. The next step requires both the Client ID and Private Key to be available to begin configuring the integration in the Mimecast Administration Console.

Mimecast Administration Console

Configure Okta Evidence Based Controls Integration

You can configure Okta Evidence Based Controls Integration within the Mimecast Administration Console, by using the following steps:

  1. Log in to the Mimecast Administration Console.
  2. Navigate to Integrations | API and Platform Integrations.

API and Platform Integrations navigation

  1. Click on the Your Platform Integrations tab, and click on the Create an Integration.
  2. Select Okta Evidence Based Controls from the list of available Platform Integrations, followed by clicking on Next.
Okta integration
  1. Step 1: Activation: Paste the Client Id and Private Key obtained for the Okta App that has been created earlier into the respective fields. The Base URL should be set to your Okta domain URL, as described in find your Okta domain.
Activation
The Private Key is visually obfuscated.
  1. Once all fields are populated, click on Authorize. An alert will appear in the top-right corner briefly to indicate whether the authorization was successful. In addition to the alert appearing for a successful authorization, Next will become enabled. Click on Next to proceed to the next step in the wizard.
Authorize
  1. Step 2: User Groups: Click on Select Groups (max. 5) to open the group selection side panel and select groups containing users that you want to be acted on by the integration. Click on Next once groups have been selected.
Selct Groups
If you need to change the groups selected, the wizard replaces the existing entries with the current selection.
  1. Step 3: Events and Okta Groups: Enable the event type that should be monitored for internal users.

The integration checks only for outbound events where the sender is an internal user.

  1. Type the first 3 letters or more of the name of an Okta and click on Search, Okta Groups that match the search input will be displayed.
  2. Select the Okta Group for that specific event type. Users will be made a member of this group when involved in the associated event type.
  3. Click on Next.

Removing users from the designated Okta group is a manual effort. This is by design.

Step Three Next
  1. Step 4: Notifications: Select from either Directory or Profile Groups for notifications related to the integration. Notifications are sent when the integration attempts to take an action on a user involved in event types being monitored by the integration.
  Configure Notifications
  1. Step 5: Summary: A summary of your configuration is displayed, enable the integration by changing the status option from Disabled to Enabled 
Summary
  1. Finally, click on Create Integration, to finalize the integration.

Edit Okta Evidence Based Controls Integration

You can edit Okta Evidence Based Controls Integration within the Mimecast Administration Console, by using the following steps:

Before editing the integration, ensure you have the Private Key:

  1. Log into the Mimecast Administration Console
  2. Navigate to Integrations | API and Platform Integrations

API and Platform Integrations navigation

  1. Click on the Your Platform Integrations tab and click on the entry for Okta Evidence Based Controls.
Okta Evidence Based Controls
  1. Click on Edit, on the slide-out panel that appears.
Edit Evidence Based Control
  1. Paste in the Private Key and click on Authorize.
  2. Click on Next to progress through to the wizard and make changes as required.
Edit Okta Based Controls Integration
Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.