Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

To configure automated security policy management using access authentication, complete the following steps:

  1. Set up the IdP you plan to use and create applications and user group attributes in the IdP. Refer to the respective vendor documentation for details.
  2. Review the prerequisites for using different protocols and IdPs. For more information, see Prerequisites for Configuring Access Authentication.
  3. Create an access authentication profile that defines the protocol and IdP you want to use. For more information, see Configuring Authentication Profiles.
  4. Enable the access authentication and DNS forwarding proxy services on the on-prem host to which you want to apply security policies. For more information, see Enabling and Disabling Services on On-Prem Hosts.

    Important Note

    Enabling the access authentication service might affect the existing DNS service. Contact Infoblox Technical Support for assistance in enabling the access authentication service. Once the service is enabled, all users will be redirected to the Access Authentication page for authentication before any DNS resolution can happen.


  5. Configure the access authentication service on the on-prem host by adding an authentication profile you want to use. For more information, see Configuring Authentication Profiles for On-Prem Hosts.
  6.  Obtain the admin token and domain from the third-party IdP you have selected in the authentication profile. Depending on the IdP, refer to the respective vendor documentation on how to obtain the admin token and domain.
  7. Synchronize user groups from the third-party IdP using the admin token and domain you retrieved from the IdP. For more information, see Synchronizing User Groups.
  8. Create or modify security policies to include specific user groups to which you want to apply the security policies. For more information, see Creating Security Policies.
  • No labels