Online Help

SafeNet Trusted Access for Symantec Endpoint Protection Cloud

Overview

The application template provides the ability to enable single sign-on for users accessing the Symantec Endpoint Protection Cloud application through SafeNet Trusted Access.

The following use cases can be configured for Symantec Endpoint Protection Cloud:

SP-initiated SSO

IdP-initiated SSO

Single logout

Configuring SafeNet Trusted Access for Symantec Endpoint Protection Cloud is a three-step process:

1.Symantec Endpoint Protection Cloud setup

2.SafeNet Trusted Access setup

3.Verify authentication

Symantec Endpoint Protection Cloud Setup

As a prerequisites, download the Identity Provider Certificate from the SafeNet Trusted Access console by clicking the Download X.509 certificate button . You will need this certificate in one of the steps below.

Perform the following steps to configure SafeNet Trusted Access as your identity provider in Symantec Endpoint Protection Cloud:

1.Log in to Symantec Endpoint Protection Cloud as an administrator using the https://securitycloud.symantec.com/sso/login URL.

2.In the left pane, click Settings and in the right pane, click Access and Authentication.

3.Under Access and Authentication, perform the following steps:

a.Under Identity Provider, in the Choose Provider field, select SAML 2.0 based Identity Provider.

b.Under SAML Configuration, copy the RelayState URL, paste it in a text editor, and save the file on your local machine.

c.In the Sign In URL field, enter the SINGLESIGNONSERVICE URL that is provided on the SafeNet Trusted Access console.

You can copy this URL by clicking the Copy to Clipboard icon available next to the SINGLESIGNONSERVICE field.

d.In the Sign Out URL field, enter the SINGLESIGNONSERVICE URL that is provided on the SafeNet Trusted Access console.

e.In the IdP Entity ID field, enter the ENTITY ID URL that is provided on the SafeNet Trusted Access console .

You can copy this URL by clicking the Copy to Clipboard icon available next to the ENTITY ID field.

f.In the Verification Certificate field, click Browse to search and select the IdP certificate that you downloaded earlier from the STA console.

g.Click Save.

SafeNet Trusted Access Setup

After completing the first step of configuring SafeNet Trusted Access in Symantec Endpoint Protection Cloud, the second step is to activate the Symantec Endpoint Protection Cloud application in SafeNet Trusted Access by performing the following steps:

1.In the Applications pane, the Symantec Endpoint Protection Cloud application you added earlier is in the inactive state by default. To configure and activate this application, click the application (for example, Symantec Endpoint Protection Cloud) and proceed to the next step.

2.Under STA Setup, in the Relay State field, enter the relay state value of Symantec Endpoint Protection Cloud that you saved earlier in step 3 (b) of Symantec Endpoint Protection Cloud Setup.

For example, https://us.securitycloud.symantec.com/sso/login

3.Click Save Configuration to save the details and activate the Symantec Endpoint Protection Cloud application in SafeNet Trusted Access.

Verify Authentication

Using STA Console

Navigate to the Symantec Endpoint Protection Cloud using the https://securitycloud.symantec.com/cc/#/landing URL.

At the top-right corner of the window, click Sign in. On the Sign in page, enter your organization email address, and click Sign In.

You will be redirected to your SafeNet Trusted Access sign-in page. Enter your primary directory login information, approve the two-factor authentication, and you should be redirected to the Symantec Endpoint Protection Cloud dashboard after authentication.

Using STA User Portal

Navigate to the User Portal URL to log in to the STA User Portal dashboard. On the dashboard, you will see a list of applications to which you have access. Click the Symantec Endpoint Protection Cloud application icon. You should be successfully logged in to the Symantec Endpoint Protection Cloud dashboard after authentication.

 

© 2019 SafeNet Trusted Access. Various trademarks are held by their respective owners.