Skip to main content

A common use case using Netskope One SSE and Okta is to extend your zero trust perimeter using Okta Network zones and the Netskope NewEdge network. This will create an additional obstacle for an attacker to use compromised credentials and is recommended by Okta as a defense against credential stuffing attacks. The Netskope One client checks the device posture or compliance in real time via Device Classification to ensure that only Corporate managed devices are allowed to connect to Okta. The following Okta authentication policy rule scenarios are presented below: (these would also apply when using tunnels)

 

Prerequisites for all policy scenarios

 

  1. Prevent users from disabling the Netskope Client in the Netskope Admin console: Settings→ Security Cloud Platform→ Client Configuration → Tamperproof 
    1. For more information: https://docs.netskope.com/en/netskope-help/netskope-client/netskope-client-hardening/ 
  2. Create a Network Zone in Okta: Security → Networks → Add zone → IP Zone
    1. The current list of Netskope IP ranges: https://support.netskope.com/s/article/NewEdge-Consolidated-List-of-IP-Range-for-Allowlisting 
    2. By default, Netskope NewEdge inserts a X-Forwarded-For header into all traffic destined to Okta domains.
  3. Add the Netskope NewEdge networks or Dedicated Egress IP Addresses (DEIP) to both the Gateway IPs and Trusted proxy IPs (this enables support for the X-Forwarded-For header inserted by Netskope and preserves IP velocity and reputation for Okta Behavior Detection and Threatsight) sections. Creating this prerequisite Network Zone is also required for Dynamic Zones.

  

Since both sections are populated, this zone is now X-Forwarded-For aware and will utilize the real client IP address for Okta policy and risk assessment 

AD_4nXdYSnHkCYYCisNervortHNGOzAuHX3uj2UPe3YgR3rMxGg8YUGAnnB8w9DHAV4yD_xFmBsnK-y78h9IQGZaGRVLy0uOV0GJBEoGxz43wSfs-ORTYQWUjNZOYwT2W_DX5TLprXCXa0x8MuArzseq9quKiJ2q?key=VVPt7CVrwd8cgDttPlaIjA

  1. Create a Okta custom error message: Customizations → Other → Access denied error message 
    • Add links for additional help and/or to open a support ticket

 

AD_4nXd-_jm7FvwIAdC3PXbPrjDqRts-DdMhdKh2VMh5MmgjtDzV9UbUoZhaL9zDdaNFo-0mj1n-uAUsNd0dEv9eWZ54oYrx-VtvR3BS73L8ObC1ayyiYikb_SfjT_v5dRzXQHgameHtd8sjz494m9leMl5jXrI?key=VVPt7CVrwd8cgDttPlaIjA

 

  1. Create a new Okta authentication policy or update an existing policy rule with the Okta Network Zone created above. See below for an example of Okta policy rules. 

 

An exception group can be used for testing or exception approvals

AD_4nXdxnBTg3u3H1ysm7dSN4SyzOFpVKE6hFXqVrjqR5Q6eyxJaqtMvzAwfJOvQQyxRUp0Ja7tkjPLsWipDRqGwWlnwui5NR48lIqdQV9MD6W2O6nMAauCEmVJLkNyOr0MjpxS2lU8qt7AmQjIErnpe5gjHnYXw?key=VVPt7CVrwd8cgDttPlaIjA

 

Allow mobile device access until the Netskope One mobile client is deployed. Require device registration(Okta Verify is installed) to prevent User-Agent string spoofing or tampering.

Scenario: Restrict access to application(s) for users that originate from Netskope NewEdge

Business Outcomes: Improve user experience for hybrid or remote users. Reduce application identity attack surface and time spent resolving security policy violations by untrusted sources. Reduce breach remediation costs by restricting adversary initial access and persistence techniques.

  • Create a rule that requires access from Netskope NewEdge and a password every 12 hours.

AD_4nXcGQbuTUfCcZPPsYrbeOGDEUW9tdOUfGK4SOeitfJn4RNEy5TqsNRBnRWy6Ldm0BCf5gaiKG7OCxfPyQiOfsuD1e5x4YlaLLmC8hw7I67fErvE1Xq8H_ZgVevjv5MR9DRUghZsOr0-MSSOyQOvFP2Z-_k88?key=VVPt7CVrwd8cgDttPlaIjA

End User Experience results

  • Okta Dashboard from Netskope NewEdge (Netskope client enabled)

 

AD_4nXchwENwk6w9OUgpaALl-iu4GlRv_Azr7mRRk2X43PByVUu9mLFrMkKwgOk8YCfXQEhAP57hhYLB_Ot6DY61ip4gVpdswy822NbDG8BhfM25AkKAmPTIMkKPYuCBn8zq_Zzxk8zziaR0KReR6yBpdbRYltZw?key=VVPt7CVrwd8cgDttPlaIjA

 

Okta Dashboard not coming from Netskope NewEdge (Netskope client disabled)

  • Authentication policy denies access and places a lock symbol on the application chiclet

AD_4nXf_2I2W10WV-uK_LrsIj2RWLk6KiM5aeSakVyXYYgar5jKs-KmbpJo69_jCoYnESUf3KHfmOwQxgj7WZD1tWFozsk4YQjrBpNSQlUOW9Ke-mnS-6SX4xpagtNNLSarporOgTjgltrjGBH19UdAxvbcePa-k?key=VVPt7CVrwd8cgDttPlaIjA

AD_4nXe3GtBKBQjVLFa5prwtZFh3NEUZuFe0og40wTudVLVG-ktuKhlp3uWT7eIEE5wxef9qsxhCrbYrr907vz60xYF39FcdQyhWuNaof4_mS_WFwbZcSVY7dSCNPtZflmz31Qn5ajOpGF9dKOZlLsi3LVZA8y8F?key=VVPt7CVrwd8cgDttPlaIjA

SP initiated Okta custom error message not coming from Netskope NewEdge (Netskope client disabled) {The Corporate Logo will be your own}

AD_4nXfbR3OlFjLJmw1Xz_TJ1_tVgqITYllsmXm2PxHI0-MCePj5Ui-Nh7UH3IajccXLAwFcyGHgZmrzfsrBAc2aLY0Fdx9Cmgczkv2xx_Z7k-iL3AgST7DyV3C1OltIW7CKryFYiUcCPzcYls0zw1Dw2oiy8ug?key=VVPt7CVrwd8cgDttPlaIjA

 

Scenario: Restrict access from Netskope NewEdge in the United States 

Business Outcomes: Reduce sovereignty compliance requirements and time spent resolving security policy violations by untrusted sources. Reduce breach remediation costs by restricting adversary initial access and persistence techniques.

This scenario requires using Netskope Dedicated Egress IP addresses. 

To obtain a list of the Dedicated Egress IP addresses for the Data Planes in the United States in the Netskope Admin console: Settings → REVERSE PROXY→SAML→ NETSKOPE SOURCE IP

AD_4nXernhtavU771R39rHizJiKQ3GyDEbdb6m45tIdhphCcXASPp68KZo9pzjGMtXdc3yTGKtxPKykflF2ceQeLllmrP_6eo4WiVfGUGv9bVR-Tejoc7TPvfduc2LbRVSe0ViIVxSdOjXPsDAevauWdXNGGktzz?key=VVPt7CVrwd8cgDttPlaIjA

Please follow the steps in the scenario above to create an Okta Network Zone using these IP addresses for the Data Planes in the United States.

 

Using a Dynamic Zone for ASN is not recommended since it only uses the ISP ASN instead of Netskope’s ASN. Proxy type also does not apply, per Okta this type is an anonymizer. Even though the Geolocation data in the logs are correct, testing has shown that neither apply to the Netskope NewEdge IP addresses. 

 

Scenario: Restrict access to originate from Netskope NewEdge and the user’s client IP originates in the United States

Accuracy of the Geo Location for IPs

Business Outcomes: Reduce sovereignty compliance requirements for user location and time spent resolving security policy violations by untrusted sources. Reduce breach remediation costs by restricting adversary initial access and persistence techniques.


Warning: If you check this box, the Dynamic Zone becomes active immediately without applying to an Authentication Policy {It is recommended to test using your Okta Sandbox or Preview Tenant}

AD_4nXf1M9uRFFsf6Xf4SiWEGDFF7miiqiNicuTMyJlVGuSf0HaGrU0TaPk146dDDPKix3ctDk8b-NeHbxNuHVY1fWKdFVIlOEUQE0AaHcA0ApFO40hQxsaDd4MCIk02iQb5gO6dhorR8D5rUH_GWUsK23XxfIE?key=VVPt7CVrwd8cgDttPlaIjA

 

  1. Using the Netskope NewEdge zone created above, create a rule to block if Not in this zone:(Netskope client is disabled)

AD_4nXfDNNsUe8gj0b74FZzpzbYxt7EQPwWN32ziuZFuV9P4-HppS3TtDYQ8ADvBIqmyjnP0UtfGEX0hqeyFyaQ1t7JLLOOFjSKJCX79K0skdk4DN1amD3WeUGEKJWBgPOG6g6FZEwr5ufFzsy7nT-nAhnL_IPYm?key=VVPt7CVrwd8cgDttPlaIjA

  1. Create a Dynamic Zone to Allow IP addresses from the United States

AD_4nXdQnHwGcQjEx7eN_b95a2n_VtDi9DW7oC7bFRDOAvGhzQpm8TEo5NRAcWsgDGbr30yNAc9lLOKmiulrazxiOd49firgJ62w8VgbwlQ0vuSj7lQ7fbBrlIThM4LRXTCPRPykH0CQ5A6Y96mtfLLetUq4p_3J?key=VVPt7CVrwd8cgDttPlaIjA

Because you created a Network Zone above called Netskope NewEdge, Okta will now evaluate the Dynamic Zone based on the X-Forwarded-For Header.(User’s real client IP address)

 

  1. Create a rule to allow from the United States 

AD_4nXe0-DBiToWAvpJdlKm1i6CA5gxMDnil3EEK8qwiBuhmcMKTt4-vv2IxD6QYmYzfnuAElZZLoOF_jfq8Miu2MvDlRq8J9YOKj96uXLhZPNoqYMBQeMTfqJvzCnDFa4DJkVvExxm6lIBG0-D-WFXF25iCtfA?key=VVPt7CVrwd8cgDttPlaIjA

 

 

Scenario: Restrict access for Administrators to originate from Netskope NewEdge or secure on-premise

(If the secure on-premise IP addresses are not behind a Proxy{No X-Forwarded-For}, use only the Gateway IPs section in the Network Zone) 

Business Outcomes: Reduce privileged account access exposure and time spent resolving security policy violations by untrusted sources. Reduce breach remediation costs by restricting adversary initial access and persistence techniques.

  1. Create a rule for an exception group (duplicated from prerequisites to emphasize importance)

AD_4nXeuky9D3ldMqbOdoGrllXAGmEFwJNQ0XPiOJDNB-b1g4rM6cM2zHrHebg179F8vVcuUepwLF0M1OJv46h4KWKYyzynNPSv8Q6s26F08FZWCZK2xHWmPsqaatCOeACu6p2ws9MINFQT_LWQObBdZagZf0dM?key=VVPt7CVrwd8cgDttPlaIjA

  1. Create a rule to allow from Netskope NewEdge or On-premise zones

 

AD_4nXeTR0cWTS3De-5OcnD1itKxQkgM18G4Wjoh_quxXz6qr9YugE_TknaPduO-2xaNzgU2qA90Sgf6tbjWrWl6uNQq4pqljlY2QPzqkMsyIy_BwXCsmDTuo1NF1JHpMg2hdZK1HMhtKA2zbgxJgpdj8suLyQtl?key=VVPt7CVrwd8cgDttPlaIjA



 

Scenario: Restrict access to Okta API Tokens to originate from Netskope NewEdge

Business Outcomes: Reduce privileged account access exposure and time spent resolving security policy violations by untrusted sources. Reduce breach remediation costs by restricting adversary initial access and persistence techniques.

 

  1. Enable the Network Restrictions for SSWS Tokens: Settings→Features {licensed feature, not available in free Okta Developer tenants}

AD_4nXc0WMyQopBMI4uN4V2sGGbXRr5QehPuFDYgd3yogmXeiZyNNAh58mrF8SLuyWWt_sOnagh1M39f97thSMOyqqBSujgcpbKf_SdoUnIXaCyvXWtFQk2tLE_yHqSdHvCdcD73TLPEZ7-KfcuK1qEZDxTbg-JB?key=VVPt7CVrwd8cgDttPlaIjA

  1. You can apply the Network restriction when creating a new API Token as below

AD_4nXf8IwzG-anhNk-0KvGTeMgFSq8UUCpfr78bllkz-kgRTt99lTFP-e5Nh1cz3_0Z6hdXZnOBkxSkht1JsU1U-xH3k7mqFK4imW7ALTTIn89atzvKH9h0McOtlEVp0khNUylXY-_S37Rb6ly6Qmk6GcgB58I?key=VVPt7CVrwd8cgDttPlaIjA

Or by editing an existing API Token and selecting the Netskope NewEdge Zone

 

 

Troubleshooting

For troubleshooting, you can view the IP Chain in the Okta system log, refer to this Okta support article. If you only see a single IP address in the Okta system log, please verify the X-Forwarded-For header using these websites: https://notskope.com or https://ifconfig.me . If you do not see the X-Forwarded-For header or two IP Chains, please check your SSL Decryption policy in your Netskope tenant.(Adding the X-Forward-For header requires decryption) If you configured a policy to bypass for Okta FastPass or Okta Verify for Windows or MacOS, change this to a process level bypass. The process names can be found in the nsdebuglog.log file as seen below:

 

**** Add this new Certificate Pinned Application your steering configurations ****

Use tunnel mode if you have Netskope Cloud Firewall and add the required outbound Okta Google Firebase ports

Be the first to reply!

Reply