SAML with CyberArk
CyberArk integrates with Knocknoc via the "Web Apps" component, passing through SAML assertions.
Knocknoc SAML config
- Log in to the Knocknoc Admin interface
- On the Settings page configure the PublicURL (eg: https://knocknoc.yourserver.com)
- Create and upload a key/cert (see below)
- Save these settings, this enables the SAML metadata file for consumption by CyberArk.
- In another tab, open the CyberArk configuration and follow below. You need to return to this Knocknoc Admin tab for the final step, providing the CyberArk SSO URL back to Knocknoc.
CyberArk configuration
- Create a Web App and establish the base settings.
- Create the SSO link and copy the URL, log back in to Knocknoc in another tab and place this URL in the "samlMetadataUrl" setting, click Save in Knocknoc.
- Under "Service Provider Configuration" enter the SAML metadata URL in the location, and select Load. The URL will be https://knocknoc.yourserver.com/api/saml/metadata
- Save
Help guide for self-hosted: https://docs.cyberark.com/pam-self-hosted/latest/en/content/pas%20inst/saml-authentication.htm
To create a key/cert pair for uploading in to the Knocknoc portal or connected IdP, follow the below:
- Generate a new certificate and key, this can be done on a Linux host using the below command.
openssl req -new -x509 -days 3650 -nodes -subj /CN=Knocknoc/ -out user-demo-knoc-cloud.crt -keyout user-demo-knoc-cloud.key
- If required, convert the certificate to pfx using the following command.
openssl pkcs12 -export -out user-demo-knoc-cloud.pfx -inkey user-demo-knoc-cloud.key -in user-demo-knoc-cloud.crt