Symantec uses Okta for both Single Sign-on (SSO) and federation of user accounts. Okta is an identity provider (IDP) that offers user authentication as a service.
Cloud Secure Web Gateway customers can choose to register with Okta using any email address or to federate their corporate IDP with Okta.
If you have access to ICDm Portal, you can configure federated SSO to enable administrators to sign in to multiple Broadcom services with one set of credentials.
See Configure federated SSO with Broadcom Okta for multiple services.
If you do not have access to ICDm Portal. Perform the following steps to ensure that all administrators can access their required services, with a minimal amount of downtime.
Federation with a partner IDP must be initiated by opening a support ticket. When you raise a support ticket to request federation, you must provide:
Note! Metadata from Cloud SWG is not needed.
Product Name |
Product Portal Link |
Symantec Cloud Workload Protection |
|
Symantec Cloud Secure Web Gateway |
|
Email Security. cloud |
|
Symantec CloudSOC CASB - EMEA |
|
Symantec CloudSOC CASB - NAM |
|
Symantec ICDm |
Example IDP attributes mapping for Azure AD:
Okta attribute name | IDP attribute name |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | |
FirstName | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname |
LastName | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
Groups | http://schemas.microsoft.com/ws/2008/06/identity/claims/groups |
UserId | http://schemas.microsoft.com/identity/claims/objectidentifier |