This article contains information on integrating Okta Evidence Based Controls with Mimecast to enhance security by identifying and managing risky internal users, through email threat detection and group management within Okta. It is intended for Administrators.
Okta Evidence Based Controls integration makes it possible to identify, alert, and manage risky internal users. Whether the intention is malicious or benign, perpetuating malicious attachments, URLs, or restricted information outside of the organization can have damaging effects on reputation and compromise business partners. Mimecast provides an additional layer of essential security against malicious activity and coupled with Okta’s identity management capabilities, mutual customers achieve an increased security posture.
Overview
Outbound emails are received by Mimecast and are subject to analysis by the Mimecast inspection funnel, where a series of advanced security scanning techniques are applied ensuring emails are safe before they are delivered to the recipient. If the email has been scanned and there are threats detected by Mimecast Targeted Threat Protection, the sending user's group membership within the Okta platform is updated as per the integration’s configuration. The Okta Groups contain Internal senders implicated with one or more enabled event types; appropriate measures should be in place and applied to the Okta Groups to mitigate the risk posed by internal senders.
Benefits
Okta Evidence Based Controls integration provides the following benefits:
- The additional layer of security provided by Mimecast protects your organization from email-based threats sent from internal users.
- Provides enhanced email threat detection efficacy with risky internal users being shared by Mimecast Email Security Cloud Gateway with Okta.
- Exposes internal threats and risks within your organization.
Prerequisites
Before you attempt to configure Okta Evidence Based Controls, ensure the following prerequisite tasks are met:
- A Mimecast tenant with active subscriptions to the following product features:
- Attachment Protection with the pre-emptive sandbox or sandbox on demand options selected. See the Configuring Attachment Protection Definitions page for more information.
- URL Protection. See the Configuring URL Protect page for more information.
-
Content Examination. See the Configuring Content Examination page for more information.
For more information on false positives, see:
- Content Examination - Definitions, Word Phrase Match List Parameter Details, and Configuring a Content Examination Definition step 8, Fuzzy Hash Setting.
- Content Examination - Validators
- Content Examination - Entity Groups
The action set in the Content Examination definition is not considered by the integration. For example, if the action is set to Delete or Bounce, the integration will still trigger the Okta Group membership update. Content Examination should be tested with the integration using a narrow scope (small group of test users) to identify any false positives that should be addressed before widening the scope of the integration to include non-test users.
- An Okta organization:
- User logins should match the users primary email address.
- An Okta app created for the integration using the Okta App Integration Wizard. See the Create custom app integrations page from Okta for more information.
Okta Administration Console
The Administrator running this task must have at least one of the following roles:
- Super admin for the Okta org.
- App admin for the Okta org.
Create App integration
You can create an App integration within the Okta Admin Console, by using the following steps:
- In the Admin Console, navigate to Applications | Applications.
- Using the action buttons on this page, click on Create App Integration.
- Select the API Services radio button.
- Set a name for the new App integration.
- Click on Edit link.
- Set the Client authentication setting within the Client Credentials section to the Public key / Private key option.
- Click on Add Key within the Public Keys section, followed by the Generate new key link that appears in the Add a public key dialog box.
- Click on the Copy to clipboard link that appears above the private key.
- Save the Private Key in a safe and secure location. The Private Key is required to update the integrations configuration with the Mimecast Administration Console.
Okta Admin Console Integrations – Important Steps
Please ensure the following actions are completed in your Okta Admin Console when configuring integrations:
- Disable the DPoP Option: If the DPoP (Demonstrating Proof-of-Possession) option is enabled for your integration, please disable it.
- Assign Administrator Roles to the Application: Make sure to assign the appropriate administrator roles to your application to ensure proper access and management.
Note:
These steps are essential for maintaining secure and effective integrations.
To prevent unauthorized changes to the configuration, access to the Private Key should be restricted to Okta Super Admins or highly trusted System Administrators or your security team should be the custodians of the private key.
- Click on Done.
- Click on Save.
- Confirm the action within the dialog box, by clicking on Save.
- Okta app for the integration should now be created successfully.
- Copy the Client ID and save this to safe and secure location, as this will be required to configure the integration via the Mimecast Administration Console.
- Finally, click on the Okta API Scopes tab and grant the below API scopes:
- okta.groups.manage
- okta.groups.read
- okta.users.read
- The Okta app configuration is now complete. The next step requires both the Client ID and Private Key to be available to begin configuring the integration in the Mimecast Administration Console.
Mimecast Administration Console
Configure Okta Evidence Based Controls Integration
You can configure Okta Evidence Based Controls Integration within the Mimecast Administration Console, by using the following steps:
- Log in to the Mimecast Administration Console.
- Navigate to Integrations | API and Platform Integrations.
- Click on the Your Platform Integrations tab, and click on the Create an Integration.
- Select Okta Evidence Based Controls from the list of available Platform Integrations, followed by clicking on Next.
- Step 1: Activation: Paste the Client Id and Private Key obtained for the Okta App that has been created earlier into the respective fields. The Base URL should be set to your Okta domain URL, as described in find your Okta domain.
- Once all fields are populated, click on Authorize. An alert will appear in the top-right corner briefly to indicate whether the authorization was successful. In addition to the alert appearing for a successful authorization, Next will become enabled. Click on Next to proceed to the next step in the wizard.
- Step 2: User Groups: Click on Select Groups (max. 5) to open the group selection side panel and select groups containing users that you want to be acted on by the integration. Click on Next once groups have been selected.
- Step 3: Events and Okta Groups: Enable the event type that should be monitored for internal users.
The integration checks only for outbound events where the sender is an internal user.
- Type the first 3 letters or more of the name of an Okta and click on Search, Okta Groups that match the search input will be displayed.
- Select the Okta Group for that specific event type. Users will be made a member of this group when involved in the associated event type.
- Click on Next.
Removing users from the designated Okta group is a manual effort. This is by design.
- Step 4: Notifications: Select from either Directory or Profile Groups for notifications related to the integration. Notifications are sent when the integration attempts to take an action on a user involved in event types being monitored by the integration.
- Step 5: Summary: A summary of your configuration is displayed, enable the integration by changing the status option from Disabled to Enabled
- Finally, click on Create Integration, to finalize the integration.
Edit Okta Evidence Based Controls Integration
You can edit Okta Evidence Based Controls Integration within the Mimecast Administration Console, by using the following steps:
Before editing the integration, ensure you have the Private Key:
- Log into the Mimecast Administration Console
- Navigate to Integrations | API and Platform Integrations
- Click on the Your Platform Integrations tab and click on the entry for Okta Evidence Based Controls.
- Click on Edit, on the slide-out panel that appears.
- Paste in the Private Key and click on Authorize.
- Click on Next to progress through to the wizard and make changes as required.
Comments
Please sign in to leave a comment.