SaaS Security
Onboard an Aha.io App to SSPM
Table of Contents
Expand All
|
Collapse All
SaaS Security Docs
Onboard an Aha.io App to SSPM
Connect an Aha.io instance to SSPM to detect posture risks.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Data Security license:
|
For SSPM to detect posture risks in your Aha.io instance, you must onboard your
Aha.io instance to SSPM. Through the onboarding process, SSPM logs in to Aha.io
using administrator account credentials. SSPM uses this account to scan your Aha.io
instance for misconfigured settings. If there are misconfigured settings, SSPM
suggests a remediation action based on best practices.
SSPM gets access to your Aha.io instance by using Okta SSO credentials that you provide during the
onboarding process. For this reason, your organization must be using Okta as an
identity provider. The Okta account must be configured for multi-factor
authentication (MFA) using one-time passcodes.
To onboard your Aha.io instance, you complete the following actions:
Collect Information for Accessing Your Aha.io Instance
To access your Aha.io instance, SSPM requires the following information, which you
will specify during the onboarding process.
Item | Description |
---|---|
User | An email address of an Okta user account.
Required Permissions: The user account must
be assigned to both the Account and Billing administrator
roles in Aha.io. |
Password | The password for the Okta user account. |
Okta Domain | The Okta subdomain for your organization. The subdomain was included in the login URL that Okta assigned to your organization. |
MFA Secret Key | A key that is used to generate one-time passcodes for multi-factor authentication. |
Instance Host | The custom domain for accessing your organization's Aha.io account. You specify this domain when you sign up for an Aha.io account, and it is included as part of the URL that you use to access the account. |
As you complete the following steps, make note of the values of the items
described in the preceding table. You will need to enter these values during
onboarding to access your Aha.io instance from SSPM.
- Identify the Okta user account that SSPM will use to access your Aha.io instance. The user account must be assigned to both the Account and Billing administrator roles in Aha.io.Remember which account you will use to access your Aha.io instance through Okta SSO authentication from SSPM. You will provide the login credentials to SSPM during the onboarding process.To access the administrator account using Okta credentials:Make note of your organization's Aha.io instance host name.After you log in to Aha.io, the instance host name is a unique subdomain included in the Aha.io URL. The URL format is <instance_host>.aha.io.
Connect SSPM to Your Aha.io Instance
By adding an Aha.io app in SSPM, you enable SSPM to connect to your Aha.io instance.- From the Add Application page (Posture SecurityApplicationsAdd Application ), click the Aha.io tile.Under posture security instances, Add Instance or, if there is already an instance configured, Add New instance.Choose the option to Log in with Credentials.Enter the user credentials, Okta domain, MFA secret key, and instance host name for accessing your Aha.io instance.Connect.