Enable SWS protections for specific groups in IdP
This topic describes how to enable Secure Web Sessions protections for a specific group of app users in your IdP.
Enable SWS for a specific group in Azure
This procedure explains how to enable SWS based on specific group app access in Microsoft Azure.
-
Log in to Microsoft Azure as an admin.
-
Go to the Attributes and Claims page of your application SAML settings, and click Add Group Claim.
-
Select the type of group you want associated with the claim.
-
Go to the Advanced options, and click Customize the name of the group claim.
-
Enter the SWS customized claim UseCyberArkSWS.
-
Select Apply regex replace to groups claim content to identify the group to apply this claim to.
-
Take the Object Id from the Group properties and add it to the regex pattern.
-
Set the regex replacement pattern to Yes to determine the output. This allows SWS to identify this claim.
-
-
Click Test sign in to make sure the users of the group are routed through SWS when accessing the application. You should be routed through the SWS validation screen before the app is accessed.
Enable SWS for a specific group in Okta
This procedure explains how to enable SWS based on specific group app access in Okta.
-
Log in to Okta as an admin.
-
Go to the SAML configuration of your application and click Edit in the SAML settings.
-
On the Configure SAML page, scroll down to the Attribute Statements section.
-
In the Name field, enter the SWS customized claim UseCyberArkSWS
-
In the Value field, enter the following regex value: isMemberofGroupName("group name") ? "yes" : null.
-
Save the SAML settings, and test sign in to make sure the users of the group are routed through SWS when accessing the application. You should be routed through the SWS validation screen before the app is accessed.