Salesforce Reverse Proxy Using Okta as the IDP | Community (2024)

A Security Practitioner's Perspective

This article will walk you through the setting up of Reverse Proxy(RProxy) for Salesforce (SFDC) using Okta as the Identity Provider (IDP). There are RProxy limitations which should be noted as it will greatly affect its use within the organization and subsequent effective use within Real-Time Policies (RTP). For example, RProxy might appear to function correctly but activities with desktop applications might be restricted or bypass RProxy altogether.

Since RProxy is meant to provide another real time steering method for machines or devices which do not have the Netskope client enabled, it is imperative to understand its limitations and plan accordingly.

Additionally, RProxy should be implemented as the last method of deploying other real time access methods since it sits between the IDP and the application. The exception to this is implementing RProxy as a Service (RPaaS). RPaaS is an application that sits in an SaaS service that also has a built in IDP.

Applications Supported in RProxy

Please see the following for a list of applications that are supported. https://support.netskope.com/s/article/Applications-supported-with-Reverse-Proxy

Implementation Steps

  1. Disable Re-Sign SAML Assertions.
  2. Create a Salesforce RProxy SAML application in the Netskope tenant.
  3. Use Postman to alter the SAML ACS URL inside Okta to point to Netskope via API request to modify the Okta App configuration to override the endpoint URL.
  4. Test access to the SFDC application in Okta with and without the Netskope Client Enabled.

Prerequisites

  1. Administrative access to Okta.
  2. A working connection between SFDC and Okta needs to be confirmed that it is working. THIS is necessary due to the intricacies of trying to configure RProxy when it is not working. While not impossible it is painful!
  3. Application similar to or capable of the functions that Postman performs with respect to API functions.
  4. Delegated Admin and Tenant Admin level of access to the Netskope Tenant.
  5. Web browser on a machine which has the Netskope Client disabled or not installed. The machine may have the Netskope Client running; however, tamper proof options should not be turned on for testing purposes.

Reverse Proxy Configuration

Disable Re-Sign SAML Assertions

  1. Login to the Netskope tenant and go to Settings.
  2. Go to Security Cloud Platform, Reverse Proxy, and SAML.
  3. Click on the Settings button located on the right-hand side of the page. The SAML Settings window will appear.
  4. Use the toggle to disable Re-Sign SAML Assertions.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (1)
  5. Click Save.

Create a SAML RProxy Application

This step will create the SAML RProxy application in the Netskope tenant. Configuration information from Salesforce is necessary to complete this step.

  1. Login to Salesforce and navigate to Settings, Identity, Single Sign-On Settings.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (2)
  2. Copy the Identity Provider Login URL and the Endpoint Login URL.
  3. Login to Okta and navigate to the Salesforce application. Open the Okta application. The application configuration page will be displayed.
  4. Click on the Sign-On tab.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (3)
  5. Scroll down to the SAML Signing Certificates section and click the Actions drop-down menu. Choose the Download certificate and store the certificate in an easily accessible location.Salesforce Reverse Proxy Using Okta as the IDP | Community (4)
  6. While on the SAML Reverse Proxy page settings, click Add Account. The New Account window will appear.
  7. Complete the following steps to add the new application.
    1. Enter a name for the SAML RPRoxy application.
    2. In the ACS URL field, use the Endpoint Login URL copied earlier.
    3. In the IDP SSO URL field, use the Identity Provider Login URL copied earlier.
    4. Open the Okta SAML Signing Certificate in a text editor, copy all of its contents, and paste it into the IDP CERTIFICATE field.
    5. Click Save.
      Salesforce Reverse Proxy Using Okta as the IDP | Community (5)
  8. Click on the Netskope Settings button next to the new Salesforce SAML Proxy application. The Netskope Settings window will appear.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (6)

    Salesforce Reverse Proxy Using Okta as the IDP | Community (7)

  9. Copy the SAML Proxy ACS URL.

Postman ACS URL Override

This step will use the SAML Proxy ACS URL copied earlier to redirect to Netskope.

  1. Login to Okta as an administrator and navigate to Security, API, and Tokens page.
  2. Click on the Create token button. The Create token window will appear.
  3. Enter a name for the token and click Create Token. The Create token window will be refreshed to display a token.
  4. Copy the token and store it in a safe location. Once you navigate from this window, the token cannot be displayed again.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (8)
  5. Open Postman and create a new GET request using the subdomain appending .okta.com/api/v1/apps followed by the app id seen when in Okta application settings.

    In my case, I am using an Oktapreview domain but the domain used for API connections is okta.com
    Salesforce Reverse Proxy Using Okta as the IDP | Community (9)

  6. Click Send. The Postman window will be refreshed to display body contents.
  7. In the body, navigate to the sign-on section and locate the ssoAcsUrlOverride setting, set to null. This is the setting to be overrode using a POST.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (10)
  8. Duplicate the tab with the GET request and change it to a PUT.
  9. Copy the body from the GET request and paste it into the body of the PUT request in raw format, using the radio button to select raw.
  10. Locate the ssoAcsUrlOverride setting and replace null with the SAML Proxy ACS URL encapsulated in double quotes.
  11. The ssoAcsUrlOverride setting should be overwritten and should be confirmed by using a GET request tab.

SFDC Application Access Testing

  1. When you access SFDC through Okta with the Netskope Client enabled, check SkopeIT Application Events. There will be logs displaying access with a Real-Time steering method of “Client”.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (11)
  2. When you access SFDC through Okta with the Netskope Client disabled, the URL will be rewritten similar to the following. https://netskope50-dev-ed---develop---lightning.force.com.rproxy.goskope.com/lightning/page/home

    In addition, there will be logs displaying access with a Real-Time steering method of “Reverse Proxy”.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (12)

    Salesforce Reverse Proxy Using Okta as the IDP | Community (13)

Use Case

RProxy shines when controlling access to SFDC on unmanaged devices, devices that do not have a Netskope Client enabled. A device that is unmanaged might be a personal machine that persons use to access SFDC while at home or a new machine deployed to an end user that does not have the client yet installed.

In this example, a remote user has been found to be accessing SFDC over RProxy and created a contact.

Salesforce Reverse Proxy Using Okta as the IDP | Community (14)

We want to stop any type of activity that might allow for alteration of contacts, send data, share, and so forth. We are going to give the end user the ability to passively use SFDC. In order to do so, we need to create a RTP that blocks those activities and notifies that end user that the activity has been blocked by choice.

  1. Navigate to Policies, Real-time Protection. Click on the New Policy drop-down menu and select Cloud App Access. The Real-time Protection Policy page will be displayed.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (15)
  2. Click on the drop-down menu for Add Criteria underneath Source, select Access Method. Then select Reverse Proxy from the drop-down menu in the Source field.
  3. In the application field, navigate to Salesforce.com and check the box next to it.
  4. In the Activities field, select all of the activities except Login Attempt, Login Failed, Login Successful, Logout, and View.
  5. In the Action drop-down menu, select Block. In the template drop-down menu, select a template to notify users.
  6. In the Policy Name field, give the policy a name which is relevant to the actions performed.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (16)
  7. Save the policy and apply the changes on the next page.
  8. Test creating a few objects such as users or contacts. Review SkopeIT Application Events and Alerts for the blocks.
    Salesforce Reverse Proxy Using Okta as the IDP | Community (17)

Netskope’s RProxy should be deployed as the last access method for real time steering to the Netskope tenant for protections. The exception is when RProxy is deployed as a service in Google Workspace or Microsoft Azure. The ability to allow for unmanaged devices access to SaaS applications is unmatched when it comes to security. This is one of many reasons as to why Netskope is “A Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE)”!

Be sure to download the Gartner® Magic Quadrant™ for Security Service Edge (SSE) here!

Salesforce Reverse Proxy Using Okta as the IDP | Community (2024)
Top Articles
40+ Best The Boy, The Mole, The Fox and The Horse Quotes
How ‘The Boy, The Mole, The Fox And The Horse’ Creator Charlie Mackesy Brought His Book To Life Through Animation
Jordanbush Only Fans
Truist Bank Near Here
Ffxiv Palm Chippings
Frank Lloyd Wright, born 150 years ago, still fascinates
Paris 2024: Kellie Harrington has 'no more mountains' as double Olympic champion retires
2024 Fantasy Baseball: Week 10 trade values chart and rest-of-season rankings for H2H and Rotisserie leagues
Beds From Rent-A-Center
CA Kapil 🇦🇪 Talreja Dubai on LinkedIn: #businessethics #audit #pwc #evergrande #talrejaandtalreja #businesssetup…
Cinepacks.store
Fcs Teamehub
A Fashion Lover's Guide To Copenhagen
Alaska Bücher in der richtigen Reihenfolge
Slmd Skincare Appointment
R/Altfeet
Hillside Funeral Home Washington Nc Obituaries
4302024447
Nebraska Furniture Tables
Moparts Com Forum
Learn2Serve Tabc Answers
Truth Of God Schedule 2023
2016 Hyundai Sonata Refrigerant Capacity
The Grand Canyon main water line has broken dozens of times. Why is it getting a major fix only now?
Wausau Marketplace
Drago Funeral Home & Cremation Services Obituaries
Orange Pill 44 291
Craigslist St. Cloud Minnesota
12 Facts About John J. McCloy: The 20th Century’s Most Powerful American?
E32 Ultipro Desktop Version
Globle Answer March 1 2023
Hesburgh Library Catalog
Unable to receive sms verification codes
Helpers Needed At Once Bug Fables
Angel del Villar Net Worth | Wife
Where Can I Cash A Huntington National Bank Check
Moxfield Deck Builder
Selfservice Bright Lending
Oreillys Federal And Evans
Radical Red Doc
Stanley Steemer Johnson City Tn
Daly City Building Division
Jack In The Box Menu 2022
Henry Ford’s Greatest Achievements and Inventions - World History Edu
Petra Gorski Obituary (2024)
Hanco*ck County Ms Busted Newspaper
Conan Exiles Tiger Cub Best Food
A jovem que batizou lei após ser sequestrada por 'amigo virtual'
Dobratz Hantge Funeral Chapel Obituaries
Craigslist Free Cats Near Me
Westport gun shops close after confusion over governor's 'essential' business list
28 Mm Zwart Spaanplaat Gemelamineerd (U999 ST9 Matte | RAL9005) Op Maat | Zagen Op Mm + ABS Kantenband
Latest Posts
Article information

Author: Edwin Metz

Last Updated:

Views: 6378

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.