Access Management

This topic describes user and Single Sign-On (SSO) management for Prevasio.

Open access management

To reach Prevasio Access Management:

Click on User Management from the Main menu. The User Management page is displayed.

Manage Users

From the Users tab you can:

Note: Click on the ellipsis button to the right of each user to:

  • Edit a user

    • Change Username, First and Last names and email address

    • Reset MFA device (displayed only if MFA is set to "yes"). This allows resetting the MFA device, for example, in case the original MFA device is lost.

  • Reset Password available only if user completed first-time login

Add a new user

  1. Click +Add user above the Actions column.

  2. Fill out the Add user form that is displayed according to the Add user fields table.

Note: Usernames must be unique.

After completing the fields, click the Add button at the bottom right of the Add user dialog.
The user is added to the list of users and is automatically sent a welcome email that enables a guided, seamless entrance into Prevasio. See Inside the invitation email.

Edit a user

To edit a user:

1. Click on the vertical ellipsis to the right of the user whose information needs editing.

2. On the options pop-up menu that is displayed, click Edit.

3. Modify the fields as required and then click Save to keep your changes or Cancel to discard them.

4. If required, change the MFA functionality for the user here.

Delete user

There are many reasons for deleting users including when a user leaves your organization. Deleting unauthorized users is an important security feature that should be undertaken in a timely manner.

To delete a user:

  1. Click on the ellipsis to the right of the user's row in the user table.

  2. On the options pop-up menu that is displayed, click Delete.
    A confirmation message asks if you are sure you want to delete this specific user:

  3. If you do not want to delete this user, click the x in the upper right corner of the message or click No.
    To proceed with deleting the user, click the Yes button.
    Upon clicking Yes, the User tab is refreshes and the deleted user is no longer in the list of users.

Reset Password

An Admin user can reset the user password.

  1. Click on the vertical ellipsis to the right of the user requiring a new password.

  2. On the options pop-up menu that is displayed, click Reset Password.

  3. On the confirmation message that is displayed, click Yes to continue.

    As a result, the relevant user receives an email that provides:

    • a link for resetting the password

    • a verification code.

    When users follow the email instructions and click on the link, they are connected with the relevant tenant and presented with a form for entering the verification code and creating their new password:

Inside the invitation email

The invitation email is a templated email from AlgoSec Prevasio to a new AlgoSec Prevasio user in your organization. It provides the new user with:

  • All credentials required for login and a button for first-time login

  • One-click links to product resources and Prevasio online help and more

A new user's first steps

Typically, the AlgoSec administrator in your organization registers qualified users in AlgoSec Prevasio as described in these sections.

Each newly added user receives an email invitation. This is an automatic action of Prevasio.

  • The email invitation includes all credentials needed by the user for logging into Prevasio for the first time, a direct link to the AlgoSec Prevasio SaaS URL and much useful information.
    The email explicitly states that credentials will expire in 30 days.

  • Typically, a new user will receive the email, follow the directions and begin using Prevasio. In such cases, the Send invitation option is not displayed in the per-user actions menu . New users that don't start promptly can be reminded using the Send invitation action.

Filter and Search for Users

In large enterprises, it's important to be able to find specific users quickly. On the Users tab, users can be located quickly by entering text into the search field.

To filter for or find users:

  • Simply enter characters into the search field.
    Users with no fields containing the entered text disappear temporarily from the list.

  • Removing the characters from the filter restores the user list.

Manage API Access Keys

The ability to generate Access Keys is an important security feature, allowing authorized users to access, examine and use relevant AlgoSec APIs.

From the API Access tab you can:

  • View an Access Key

  • Add a new API Access Key

  • Edit an Access Key

  • Delete an Access Key

    View an Access Key

    When you view an access key you can copy the Client ID and the Client secret but you cannot edit any fields.

    1. Click on the vertical ellipsis to the right of the access key to view.

    2. On the options pop-up menu that is displayed, click view.

    3. To get the API Token required for Prevasio authorization, copy the Client ID and Client Secret to use in the Log in to the Tenant endpoint .

    4. When you finish with the Access key view, click Done to close it.


Add a new API Access Key

  1. From Settings > Access Management > API Access tab, click +Add key.
    The Add Access Key dialog is displayed:

  2. Fill in the fields as indicated in this table, and then click Add in the lower right corner:

    Field Description
    Access key name Any meaningful text
    API access session timeout

    Minutes. Current value is 60 minutes and is editable.

Edit an Access Key

To edit an access key:

  1. Click on the vertical ellipsis to the right of the access key that needs editing.

  2. On the options pop-up menu that is displayed, click Edit. The Edit access key dialog is displayed.

  3. Optionally edit or use fields as follows:

  4. Field Description
    Access key name Edit freely.
    Client ID Copy this to a safe place. You cannot edit the Client ID.
    Client secret Copy this to a safe place. You cannot edit the Client secret.
    API access timeout. You can edit the number of minutes.
  5. Click Save to keep your changes or Cancel to discard them.

Delete an Access Key

Deleting an access key is very simple.:

  1. Click on the vertical ellipsis to the right of the access key you wish to delete.

  2. On the options pop-up menu that is displayed, click delete.
    A confirmation Delete access key dialog is displayed, showing the name of the API access key to be deleted.

  3. Click Yes to delete the key.

    Note: You can click No to close the dialog without deleting the API access key.

Manage Single Sign-On (SSO)

Enable SSO login on your tenant to give users access to multiple services with a single authentication, reducing password fatigue and providing an easier sign up and log in experience.

Note: AlgoSec SaaS applications officially support Azure Active Directory and Okta as SSO providers. Other SAML2 SSO providers may also work. Try to enable following the instructions below. If you encounter difficulties contact AlgoSec support for assistance.

Important: Users must have a valid email address, surname (last name), given name (first name), and name identifier in the relevant fields of the Identity Provider.

Set SAML attributes as specified by your identity provider.

  • For Active Directory, use:

    • Attribute Name= http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress  Value=user.email

    • Attribute Name=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname and Value= user.surname

    • Attribute Name=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname and Value= user.givenname

    • Attribute Name=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name and Value= user.principalname

  • Similarly for Okta, use recommended attribute statements:

    • Name=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress and Name Format=URI reference format and Value=user.email)

    • Name=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname and Name Format=URI reference format and Value= user.lastName

    • Name=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname and Name Format=URI reference format and Value= user.firstName

    • Attribute Name=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifyer and Name Format=URI reference format and Value= user.login

To configure SSO user authentication

  1. In the Prevasio Main Menu, select User Management. Click the SSO SETUP tab.

  2. Enter the email of the IT admin associated with your account and click Send Parameters.

    The application parameters are sent to that email address.

    Note: Using the details sent by Prevasio, the IT admin generates the XML metadata file needed for the next step.

    Tip for IT department: For more information about Federation Metadata XML, refer to Identity provider documentation.

  3. Upload the XML metadata file provided by the IT admin and then click Activate SSO.

    Once activated, all users in the Users tab can log in with SSO.

    Note:

    • A check appears on the Users tab in the SSO Authenticated column after a user logs in at least one time using SSO.

    • +Add User is disabled for SSO-enabled tenants. Contact your IT department to add additional users.

Deactivate / Reactivate SSO

To deactivate SSO: Administrators can deactivate SSO on a tenant by clicking Deactivate SSO.

To reactivate SSO: Administrators can reactivate SSO using the previously stored XML metadata file by clicking Reactivate SSO.