Swift Security Docs
  • Introduction to Swift Security
  • Onboarding
    • Tenant Setup
    • Product Deployments
      • Browser Extension
      • LLM Guardrails
        • LLM Guardrails API Integration
      • VS Code IDE Extension
    • Directory Sync
      • Configuring Google Directory Sync
      • Configuring Microsoft Directory Sync
    • MDM
      • Extension Deployment Via Google Workspace
      • Extension deployment via google workspace + MDM at device level
      • Extension Deployment Via Microsoft Intune
        • Chromium Browsers in Windows
        • Edge Browsers in Windows
        • Firefox Browsers in Windows
      • Extension Deployment Via Kandji
        • Chromium Browsers in Mac
    • Infrastructure
      • SaaS Model
      • Hybrid deployment (coming soon)
  • SSO (Single Sign-On)
    • SSO Configurations identity provider - Google workspace
    • SSO Configurations identity provider - Microsoft Entra ID
  • Administrative Guide
    • Console Users
      • Role Creation
      • RBAC General Settings for Login Methods (for the Console)
      • User Creation
      • SSO login(okta)
    • Swift Detection Engines
      • Data Identifiers
        • Custom Data Identifiers
      • EDM Dictionaries
        • EDM Rule
        • EDM Profile
        • EDM Extension Policy
      • Data Rules
        • Custom Rules
      • Data Profiles
      • LLM Guardrail Scanners
        • Data Protection Scanner
        • Gibberish Scanner
        • Ban Substrings Scanner
        • Invisible Text Scanner
        • Code Scanner
        • Language Scanner
        • Sentiment Analysis Scanner
        • Jailbreak Scanner
        • Toxicity Scanner
        • Prompt Injection Scanner
        • Token Limit Scanner
        • Reading Time Scanner
        • Language Same Scanner
        • No Refusal Scanner
        • Factual Consistency Scanner
        • Bias Detection Scanner
        • URL Reachability Scanner
        • Nudity Scanner
        • Gender Scanner
        • Celebrity Scanner
        • Face Scanner
        • Race Scanner
        • Performance and Benchmark
    • Browser Extension
      • Extension Installation
      • Granular Policies
        • Control URL access
        • Protect company data
        • Protect against Threats (Coming Soon)
      • Extension Alerts
      • Extension Events
      • Extension Popups
      • Browser Extension Coverage
    • LLM Guardrails
      • LLM Guardrails Policies
      • LLM Guardrails Alert
      • LLM Guardrails Events
    • Regulation Laws
  • Assets
    • Applications
    • Users
    • Extensions
  • Integration
    • Notification
      • Jira
      • ServiceNow
      • Slack
      • Splunk
    • Forensic
    • Feature
      • Rules Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Data identifiers Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Supported MIME Types
      • Supported OCR Format
    • Manage unauthorized access from unmanaged browser
  • Settings
    • Manage Reasons
    • Audit Log
  • Release Notes
    • Version - 1.27
    • Version - 1.26
    • Version - 1.25
    • Version - 1.24
    • Version - 1.23
    • Version - 1.16
    • Version - 1.15
    • Version - 1.14
    • Version - 1.13
    • Version - 1.12
    • Version - 1.11
    • Version - 1.10
    • Version - 1.09
    • Version - 1.08
    • Version - 1.07
    • Version - 1.06
    • Version - 1.05
    • Version - 1.04
    • Version - 1.03
    • Version - 1.02
    • Version - 1.01
Powered by GitBook
On this page
  • Integrating the Swift Security Extension Inline Hook with Your OKTA Application
  • Overview
  • Prerequisites
  • Step 1: Create an Inline Hook in OKTA
  • Step 2: Integrate the Inline Hook with Your SAML Application
  • Step 3: Test the Integration
  • References and Further Reading
  1. Integration

Manage unauthorized access from unmanaged browser

PreviousSupported OCR FormatNextSettings

Last updated 9 months ago

Integrating the Swift Security Extension Inline Hook with Your OKTA Application

Overview

This guide provides step-by-step instructions on integrating a custom inline hook with your OKTA application to ensure users have the Swift Security extension installed in their browser. If the extension is not detected, the user will be prevented from accessing the application after OKTA authentication. This integration is crucial for maintaining security compliance by enforcing the use of the Swift Security extension.

Prerequisites

  • Access to OKTA Admin Console

  • OKTA API Access Management

  • Your application configured in OKTA

Step 1: Create an Inline Hook in OKTA

  1. Log in to the OKTA Admin Console:

    • Navigate to your OKTA organization and sign in as an administrator.

  2. Go to Inline Hooks:

    • From the Admin Console, go to Workflow > Inline Hooks.

  3. Create a New Inline Hook:

    • Click on the Add Inline Hook button.

    • Select Type as SAML Assertion Inline Hook.

    • Provide a name for the inline hook, such as "Swift Security Extension Check".

  4. Configure the Inline Hook:

    • Hook URL: Enter the URL for your custom hook: https://extensionservice-swift.swiftsecurity.ai/hook

    • Authentication Header: If your hook requires authentication, enter the necessary header value.

    • Save the inline hook configuration.

Step 2: Integrate the Inline Hook with Your SAML Application

  1. Navigate to Your SAML Application:

    • Go to Applications > Applications in the Admin Console.

    • Select the application where you want to enforce the Swift Security extension.

  2. Edit the SAML Application:

    • Click on the General tab.

    • Scroll down to the SAML Settings section and click Edit.

  3. Add the Inline Hook:

    • Scroll down to the Advanced Sign-On Settings section.

    • Look for the Assertion Inline Hook dropdown.

    • Select the "Swift Security Extension Check" inline hook you created earlier.

  4. Save the Changes:

    • Click Next and then Finish to save the SAML configuration.

Step 3: Test the Integration

  1. Test Authentication:

    • Perform a test sign-in to the application as a user.

    • If the Swift Security extension is not installed, the user will be prevented from accessing the application, and an appropriate error message will be displayed.

  2. Verify Log Entries:

    • You can monitor the logs in OKTA to ensure that the inline hook is being triggered correctly and the extension check is enforced.

References and Further Reading

For more details on configuring inline hooks and SAML applications in OKTA, refer to the following OKTA documentation:

Conclusion

By following these steps, you have successfully integrated the Swift Security Extension inline hook with your OKTA application. This ensures that users can only access the application if they have the necessary security extension installed, enhancing the overall security posture of your environment. If you encounter any issues, refer to the OKTA documentation or reach out to Swift Security support for further assistance.

OKTA Inline Hooks Documentation
How to Configure SAML 2.0 for Your Application in OKTA
OKTA API Access Management