Onboarding Wizard

Print Friendly, PDF & Email

When you log on for the first time, a wizard appears to help the user configure their organization setup in Seqrite HawkkProtect. The complete on-boarding of Users, Applications and Services can be done in the following 8 steps.

  1. Add Identity Providers.
  2. Add Certificates.
  3. Add Sites.
  4. Add App Connectors.
  5. Add Tags.
  6. Add Applications and Services.
  7. Add Zero Trust Policies.
  8. Add Default Hierarchy.

Click Proceed to start the on-boarding.

Wizard onboarding welcome screen

Adding Identity Providers

Enter the details for your identity and access manager application that manages the access rights of all users in your organization.

Ensure that you configure the following prerequisites before adding the identity providers.

IdP Type Prerequisites
Microsoft Azure Create an enterprise application on the organization’s azure ID and create a user sync app on Microsoft Azure. To know more, click https://docs.seqrite.com/docs/seqrite-hawkkprotect/settings/idp/prerequisites-for-microsoft-azure/
Google IdP Create a gateway SAML app on Google Workspace and then create a user sync app on Google Cloud Console. To know more, click https://docs.seqrite.com/docs/seqrite-hawkkprotect/settings/idp/prerequisites-for-microsoft-azure/
ADFS Configure relying part in ADFS server. To know more, click https://docs.seqrite.com/docs/seqrite-hawkkprotect/settings/idp/configuring-relying-party-trust-in-adfs-server/

Click Proceed to add Identity Providers (IdP).

The Add IdP page is displayed.

WO Step 1.1 IdP
WO Step 1.2 - Add IdP

Enter the IdP details as follows.
I. In the IdP Details dialog, enter the following information.

Column Name Description
IdP Name Name of the IdP.
IdP Description Description of the IdP.

II. In the IdP Type Details dialog, enter the following information.

Column Name Description
IdP Type Type of the IdP.
Authentication Method Authentication method used to authenticate users.

You need to enter the following details based on the selected IdP type.

IdP Type Authentication Method Details To Be Entered
Active Directory 2012 Custom Admin Username for AD, Admin Password for AD, Host, Port, Base DN, Bind DN.
Active Directory 2016 Custom Admin Username for AD, Admin Password for AD, Host, Port, Base DN, Bind DN.
Microsoft Azure SAML Entity ID, Reply URL, XML URL, Application (client) ID, Client secrets, OAuth 2.0 token endpoint (v2).
Google Workspace A.K.A. G Suite SAML Entity ID, Reply URL, Federation Metadata Type, XML URL, Client ID, Client Secret, Project ID.
ADFS SAML Entity ID, Reply URL, Host, Federation Metadata Type, XML URL, Admin Username for AD, Admin Password for AD, Host, Port, Base DN, Bind DN.

III. After entering these details, click Add IdP. The IdP Management page is displayed.

WO Step 1.3 IdP mgmt

Click Proceed to Step 2.

Adding Certificates

In this step, add a valid security certificate for your organization so that the connections between HawkkProtect and application servers are secure and authenticated.

WO Step 2.1 Certificate

Click Proceed to add Certificates. The Import Certificate page is displayed.

Importing a certificate

Importing a certificate

In the Certificate Details dialog, enter the following details.

Field Description
Certificate Name Certificate name.
Certificate Description Certificate description, if any.
Private Key File Browse and upload the key file available in the certificate.
Certificate File Browse and upload the certificate file available with the administrator.
Certificate Chain The certificate chain file in case of multiple entries in a certificate file.
Passphrase If the private key file is encrypted, enter the passphrase.

After you have entered the details, click Import Certificate.
The Certificate Management page is displayed.

WO Step 2.3 Certificate mgmt

Click Proceed to Step 3. The Add Sites dialog is displayed.

Adding Sites

The Tenant administrator must add the location/sites where the organizational applications/services are hosted or located.

WO Step 3.1 Site

Click Proceed to add Sites. The Add Site dialog is displayed.

WO Step 3.2.1 Add Site

On the Add Site dialog, you are required to verify the site domain. To verify the site domain, follow these steps.

I. Copy the TXT record by clicking the copy icon.
II. Log on to the Domain Host Control Panel.
III. Select your domain to access the domain settings.
IV. Click Manage DNS. DNS records table appears.
V. Add the TXT record in this table and enter required details.

The above steps may vary according to the DNS provider. Please refer the documentation provided by the DNS provider for the same.

Note:
It may take up to 48 hours to update this TXT record in the domain.

Now, return to the Add Site dialog.

Enter the domain name in the Site Domain Name textbox. Click Verify Site Domain.
If verification is successful, the Site Details form dialog is enabled.

WO Step 3.2.2 Add Site

In the Site Details section, enter the following details.
I. Enter the site name and site description.
II. Choose the appropriate certificate and IdP from the drop-down list boxes.
III. After this is done, click Add. The Site Management page is displayed.

WO Step 3.3 Site mgmt

Click Proceed to Step 4 for adding the App Connectors.

Adding App Connectors

In this step, you must specify the connection details to connect HawkkProtect to your application servers.

WO Step 4.1 App connector

Click Proceed to add App Connectors. The Add App connector page is displayed.

WO Step 4.2 Add app connector

On the Add App Connector page, enter the following information.

I. In the App Connector Details dialog, enter the following information.

Fields Description
App Connector Name App connector name.
App Connector Description Description of the app connector, if any.

II. In the App Connector Other Details dialog, select the site from the drop-down list. This is the domain name where organizational applications/ services are hosted.
III. After entering this information, click Add. The App Connector Management page is displayed with app connectors list and description.

The App Connector Management page is displayed with app connectors list and description.

WO Step 4.3 App connector mgmt

Click Proceed to Step 5 to start adding tags.

Adding Tags

In this step, you must add the dynamic tags that help you specify the parameters to create policies for allowing a connection.

WO Step 5.1 Add tag

Click Proceed to add Dynamic Tags. The Add Dynamic Tag dialog is displayed.

WO Step 5.2 Add user tag

Enter the information as follows.

Fields Description
Tag Key Enter the suitable tag key.
Tag Color Select the desired tag color.
Data source Shows the data source from which the user data is fetched.
Tag applied to Select the entity to which you need to apply the tag.
Attribute Select the tag attribute.
Criteria Select the appropriate criteria from the drop-down menu.
Expression Enter the expression depending on the selected criteria. For Entire length, The ‘expression field will be disabled. For Nth Element and RegEx options, you can enter the expression as required.
Description Enter the description for the tag.

WO Step 5.3 Add application tag

If you click the Application option under Tag Applied To, the following information needs to be entered.

  • Variable/ Parameter: The entity to which the tag will be applicable.
  • Description: Tag description, if any.

After you have completed entering the required information, click Add.
The Tag Management page is displayed and the added tags are listed in the display.

WO Step 5.4 tag mgmt

Click Proceed to Step 6 to add Applications and Services. The corresponding dialog is displayed.

Adding Applications and Services

Here, the tenant administrator must add the applications and services to which you want to apply the Zero Trust paradigm.

WO Step 6.1 Application catalog

Click Proceed to add Applications and Services. The Add applications dialog is displayed.

WO Step 6.2 Add application 1
WO Step 6.2 Add application 2

On the Add Application page, enter the details as follows.

I. In the Application Information dialog, enter the following details.

Field Name Description
Application Name Name of the application.
Application Description Additional details about the application, if any.
Application Logo Upload the application logo according to specifications mentioned.

II. In the Application Details dialog, enter the following details and select appropriate options (wherever applicable).

Field Name Description
IP Address / URL Enter the IP Address / URL of the application.
Protocol Select the appropriate protocol from the drop-down menu.
Port/ Port Range Select the appropriate option from the drop-down menu.
Port Value Enter the appropriate port number.
Enter Port Number Enter the appropriate port number for the connection.
Tags Tags applicable to the application.
External Web Address External web address for the application.

For the following application types, you also need to select the appropriate app connector from a drop-down menu.

  • Private Web Apps & Services.

III. After entering this information, Click Add.

The Application Catalog page is displayed with application details that you have configured.

WO Step 6.3 application catalog

Click Proceed to Step 7.

Adding Zero Trust Policies

In this step, you must add the policies with necessary conditions to access or restrict access to the applications.

WO Step 7.1 Policy

Click Proceed to add Zero Trust Policies. The Add policy dialog is displayed.

WO Step 7.2 Add policy 1
WO Step 7.2 Add policy 2

Enter the following details.
I. In the Policy Information dialog, enter the following information.

Column Name Description
Identifier Suitable identifier for the policy.
Name Name of the policy.
Observe Shows whether connections allowed under this policy are being observed.
Description Detailed description of the policy.

II. In the Allow Rule dialog, enter the following information.

Column Name Description
Source Tags Tags applied on user from where the connection is established.
Destination Tags Tags applied on applications where the connection is received.
Exception Tags Based on connection requirement, these tags will exclude users to whom available source tags are applicable.

III. Click Save as draft if you want to work on the policy later. Else, click Add Policy.
The Policy Management page is displayed and the added policies are displayed in the list.

WO Step 7.3 Policy mgmt

Click Proceed to Step 8. The Add Default Hierarchy dialog is displayed.

Adding Default Hierarchy

You can create the default hierarchy for users and services based on location, department, role, etc.

WO Step 8.1 hierarchy

Click Proceed to create Default Hierarchy. The Default Hierarchy dialog is displayed.

WO Step 8.2 Add hierarchy

You can enter the User and Service Hierarchy details as required. These details help you view the status of the attempted connections of users to the grouped applications and services. Enter the details as follows.

In the User Hierarchy dialog, enter the following details.

  1. User Hierarchy Name.
  2. Hierarchy Tags. You can add more tags by clicking the Add Hierarchy Tag button.

In the Service Hierarchy dialog, enter the following details.

  1. Service Hierarchy Name.
  2. Hierarchy Tags. You can add more tags by clicking the Add Hierarchy Tag button.

After entering this information, click Create.

A success prompt is displayed for a successful configuration. You can now view the connections between the users to the applications and services on the dashboard.

Note:
You can add and use a maximum of 6 hierarchy tags for each hierarchy. A maximum of 6 hierarchies (1 Default and 5 Custom) can be created in one workspace.

WO success message

Click View Connections. This will open the Hierarchy view on Visibility page.

Was this page helpful?