Identity and Access Management

Platform Roles

Roles are mutually exclusive. All users must be assigned one of the following roles.

Role NameDescription
AdministratorFull access to all Zyston Platform capabilities
Report ViewerRead access to Zyston CyberCAST assessment reports and associated findings

Single Sign-On ("SSO")

The Zyston CyberCAST Platform can be configured to support user logins via the web portal using an identity provider supporting SAML v2.

When configured for SSO, the platform will automatically create new users for any SAML assertion received from your identity provider. This allows you to control access to the Zyston CyberCAST Portal entirely from your organization's identity and access management solution.

SSO Configuration Checklist

  • Ensure you have the Administrator role assigned to your Zyston Platform user
  • Configure an application in your Identity Provider with the following parameters:
    • Application Name: Zyston CyberCAST Portal
    • Application Identifier: https://cybercast.zyston.com
    • SAML Assertion Consumer Service URL: https://cybercast.zyston.com/sso/saml/acs
  • Obtain the SAML metadata URL generated by your identity provider
  • Create a new SAML SSO provider in the Zyston Portal using the metadata URL

User Management with SSO Configured

Once you have configured an SSO Identity Provider, existing users will no longer be able to login with their password and two-factor authentication code. All new logins must go through your identity provider.

Users with the Administrator role may continue to login through a special URL if it should become necessary to login without the use of SSO. For example, in the event you need to modify your SSO configuration.

https://cybercast.zyston.com/admin-bypass-sso

SSO Identity Provider Support

Any identity provider supporting SAML v2 should be configurable to work with the Zyston Platform. In particular, we support and have configuration examples for:

SSO Configuration Example: Microsoft Azure

Step 1: Create a new Enterprise Application in the Azure Active Directory Portal

  • Within the Azure AD portal, select the Enterprise Applications menu item from the left-hand menu
  • Click the New application button on the button bar at the top of the screen
  • Click the Create your own application button at the top of the next screen

Step 2: Provide a Descriptive Name for the Application

  • Set the Application Name to Zyston Cybercast
  • Click Create at the bottom of the screen

Azure Setup Step 2

Step 3: Configure the Single Sign-On Settings

  • Click Set up single sign on

Azure Setup Step 3

Step 4: Select SAML Sign-On Method

  • Click SAML

Azure Setup Step 4

Step 5: Provide SAML Configuration

  • Click Edit in the Basic SAML Configuration section
  • Click Add Identifier and enter https://cybercast.zyston.com
  • Enter https://cybercast.zyston.com/sso/saml/acs in the Sign On URL field
  • Click Save

Azure Setup Step 5

Step 6: Capture the SAML Metadata URL

  • Copy the App Federation Metadata URL in the SAML Certificates section

Azure Setup Step 6

Step 6: Enter the Metadata URL in the Zyston CyberCAST Portal

  • Navigate to Settings
  • Click Configure SSO
  • Enter the metadata URL copied in the previous step
  • Click Continue

SSO Configuration Example: Okta Workforce

Step 1: Create a new Application in the Okta Admin Portal

  • Within the Okta Admin portal, select the Applications menu item from the left-hand menu
  • Click the blue Create App Integration button

Okta Setup Step 1

Step 2: Select the Sign-In Method

  • Select SAML 2.0 as the sign-in method
  • Click Next

Okta Setup Step 2

Step 3: Provide a Descriptive Name for the Application

  • Set the Application Name to Zyston Cybercast
  • Click Next

Okta Setup Step 3

Step 4: Configure the Single Sign-On Settings

  • Set the Single Sign-On URL to https://cybercast.zyston.com/sso/saml/acs
  • Set the Audience URI to https://cybercast.zyston.com
  • Set the Application Username to Email
  • Click Next

Okta Setup Step 4

Step 5: Capture the SAML Metadata URL

  • Copy the Metadata URL provided by Okta

Okta Setup Step 5

Step 6: Enter the Metadata URL in the Zyston CyberCAST Portal

  • Navigate to Settings
  • Click Configure SSO
  • Enter the metadata URL copied in the previous step
  • Click Continue

How to Configure Office 365 to Support Zyston Office 365 Monitoring Services

Background

Zyston uses a proprietary scanning platform to periodically scan Office 365 environments for subscribers to the Office 365 Monitoring Services.  Best practices for Office 365 stipulate that two-factor identification (2FA) be employed on Office 365.  Because Microsoft’s 2FA implementation is specifically designed to prevent being impersonated by machine automation, an exclusion must be implemented to allow the scanner to authenticate so it may scan the environment.

This involves placing the IP address of the scanning platform on a list of hosts that are allowed to authenticate to the environment without 2FA.  This does not mean that 2FA is disabled, it merely means that 2FA will not be required on authentication attempts from that one host.

Instructions

Note: Click on any image to embiggen.

Step 1:   Sign into your Office 365 environment using an administrator account.**

Step 2:  Navigate to the configuration page for Multi-Factor Authentication Service settings.**

Navigate to the Admin applet.

Navigate to Active Users.
(Note: It may be necessary to expand your menus in order to see this option.)

Navigate to Multi-Factor Settings.

Open the Multi-Factor Authentication Service Configuration page.

Step 3: Add the Zyston scanning host IP address to the list of exclusions.

When the configuration page appears, you will see a large field under “Trusted IPs.” There may or may not already be items in this field. Do not disturb anything already in that list. Add a new line to the end of the list:

20.64.112.99/32

Save your changes Click "Save" at the bottom of the page. This completes the configuration.






Copyright 2022-2023, Zyston, LLC | 13355 Noel Road, Suite 510 | Dallas, TX 75240