Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 12 additions & 5 deletions docs/kb/passwordpolicyenforcer/ppe-supportability.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: "Understanding Password Policy Enforcer Supportability"
title: "Understanding PPE Supportability"
description: >-
Defines support levels for Password Policy Enforcer versions, including which
versions receive bug fixes, security patches, and configuration assistance.
Expand All @@ -23,7 +23,7 @@ tags:
- kb
---

# Understanding Password Policy Enforcer Supportability
# Understanding PPE Supportability

## Overview

Expand All @@ -45,6 +45,12 @@ The latest version of PPE is always the definitive reference — check the [Netw

---

### Operating System Support

The Password Policy Enforcer documentation includes a list of supported Windows versions. Support is only available for the compatible Windows versions.

---

### Support Level Definitions

#### Active Support (Latest Version)
Expand Down Expand Up @@ -95,7 +101,7 @@ PPE is composed of the following components, which are released and versioned to
| Configuration Console | Administrative UI for managing password policies |
| PPE Web | Web-based interface for self-service password changes and resets |

All four components ship as a single versioned release. For a deployment to be considered fully on the latest version — and therefore eligible for Active Support and bug fixes — all components must be upgraded to the same current release. Running mismatched component versions is not a supported configuration and may result in unpredictable behavior.
All four components ship as a single versioned release. For a deployment to be considered fully on the latest version — and therefore eligible for Active Support and bug fixes — all components must be upgraded to the same current release. Netwrix does not support running mismatched component versions, which may result in unpredictable behavior.

---

Expand All @@ -114,7 +120,7 @@ If you are running the latest version of PPE with all components upgraded:
If you are on the previous major version of PPE:

- The support team will provide configuration guidance to help you work within your current version.
- If you report a bug, Netwrix will ask you to first verify whether the issue exists in the latest version (in production or a test environment).
- If you report a bug that is known to be fixed in a later version, the support team will ask you to upgrade to the latest version. If the bug is new, the support team will attempt to reproduce it on the latest version. If the support team cannot reproduce it, you may be asked to upgrade to the latest version to confirm whether the problem still exists. Bug fixes will only be applied to the current version, unless they are also security fixes, in which case they will be applied to older versions according to the table above.
- If the issue is confirmed in the latest version, Netwrix will develop a fix for the latest version only and will not backport it to N−1.
- Netwrix will patch security vulnerabilities for N−1.
- Netwrix will recommend upgrading to the latest version at every opportunity.
Expand All @@ -131,7 +137,8 @@ Customers on any version older than N−1 are not eligible for support. Netwrix

Staying current with PPE is the best way to ensure your password policy enforcement is secure, effective, and fully supported. Netwrix recommends:

- Upgrade all PPE components together when a new version is released — never mix component versions.
Netwrix develops and tests PPE's components (Server, Client, Configuration Console, Mailer, and PPE/Web) as a single package. Use all components from the same version for the best results. Refer to the upgrade instructions in the documentation for the correct upgrade procedure. During an upgrade, you will temporarily run components from two versions simultaneously. Do not enable any new features in the new version during this time, or run mixed versions for an extended time. If you encounter a problem that the support team believes is caused by mismatching versions, you may be asked to finish the upgrade before troubleshooting continues.

- Review the release notes before upgrading to understand what has changed.
- Test upgrades in a non-production environment before rolling out to your full domain.
- Plan upgrades proactively rather than reactively — waiting until you encounter an issue on an unsupported version limits your options.
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"label": "Single Sign On",
"position": 90,
"collapsed": true,
"collapsible": true
}
119 changes: 119 additions & 0 deletions docs/policypak/deliverymethods/cloud/knowledgebase/singlesignon/sso.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,119 @@
---
title: "Single Sign-On (SSO) — Customer Request Guide"
description: "How to request and configure Single Sign-On for PolicyPak Cloud using Microsoft Entra ID or Okta."
sidebar_position: 1
---

# Single Sign-On (SSO) — Customer Request Guide

PolicyPak Cloud supports Single Sign-On (SSO) using your organization's identity provider (IdP) — such as Microsoft Entra ID (Azure AD) or Okta. Once you configure SSO, users can log in to PolicyPak Cloud using their existing corporate credentials instead of a separate password.

This is an assisted process. The following steps explain what information to submit, what the Netwrix team does on the backend, and what you need to do to finish the configuration.

:::note
After submitting your ticket, allow up to three (3) business days for the Netwrix team to complete the backend tenant provisioning. The Netwrix team will notify you when your environment is ready.
:::

## What You Will Need Before Submitting

Have the following ready when you open your support ticket:

- Your PolicyPak Cloud company name and the email address of your current company administrator
- Your identity provider type: Microsoft Entra ID, Okta, or another OpenID Connect (OIDC)-compatible provider
- The email domain your users will authenticate with (for example, yourcompany.com)
- Access to an Entra ID or Okta admin who can register an application and generate a Client ID and Client Secret

## Step 1 – Open a Netwrix Support Ticket

Open a ticket through the [Netwrix support portal](https://www.netwrix.com/tickets.html#/open-a-ticket).

In your ticket, select **Netwrix PolicyPak**, include the information listed above, and request "PolicyPak Cloud SSO setup."

The PolicyPak Support team will receive your ticket and coordinate with the Netwrix internal team responsible for tenant provisioning. You don't need to contact any other team directly.

## Step 2 – Netwrix Provisions Your 1Secure Tenant (No Action Required)

Netwrix 1Secure, Netwrix's identity management platform, handles PolicyPak Cloud SSO and manages authentication for your tenant.

After receiving your ticket, the Netwrix internal team creates a Netwrix 1Secure tenant for your organization and invites your designated administrator using their corporate email address. This step happens entirely on the Netwrix side.

This step is complete when you receive a "Welcome to Netwrix 1Secure" invitation email.

## Step 3 – Accept the Netwrix 1Secure Invitation Email

Your designated administrator will receive a "Welcome to Netwrix 1Secure" email from noreply-account@netwrix.com. Open the email and click **Activate my Netwrix account**.

:::warning
The activation link expires 48 hours after Netwrix sends it.
:::

![Welcome to Netwrix 1Secure invitation email with activation button](/images/policypak/cloud/singlesignon/ppcloudsso6.webp)

## Step 4 – Set Your Netwrix Account Password

If you haven't already set up your account, clicking the activation link prompts you to create a password for your Netwrix account. This is a one-time step required to access the 1Secure portal where you configure SSO.

Your password must meet the following requirements:

- At least 12 characters
- At least 3 of the following: lowercase letters (a–z), uppercase letters (A–Z), numbers (0–9), special characters
- No more than 2 identical characters in a row

![Netwrix account password setup screen](/images/policypak/cloud/singlesignon/ppcloudsso5.webp)

## Step 5 – Configure SSO in Netwrix 1Secure

Once your account is activated, navigate to the [Netwrix 1Secure portal](https://1secure.netwrix.com/) and sign in.

Go to **Configuration** > **My Organization** > **Authentication**, then open **Authentication Settings**. Select your SSO method (Entra ID or OIDC for Okta), enter your domain name, and supply the Client ID and Client Secret from your identity provider.

:::note
If you use a different OIDC-compatible provider, select **OIDC** and follow the same fields as the Okta path.
:::

Before continuing, register your application and obtain a Client ID and Client Secret by following the appropriate guide:

- [Configure SSO with Entra ID / OIDC](https://docs.netwrix.com/docs/1secure/admin/login/sso#configure-sso-with-openid-connect-authentication)
- [Generate a Client Secret Value](https://docs.netwrix.com/docs/1secure/configuration/registerconfig/#generate-client-secret-value)

:::tip
Optionally enter a Client Secret Expiry Date. Netwrix 1Secure will alert you before the secret expires so you can renew your SSO connection without disrupting access.
:::

![Authentication Settings in Netwrix 1Secure with Client ID and Client Secret fields highlighted](/images/policypak/cloud/singlesignon/ppcloudsso3.webp)

## Step 6 – Add Your Federated User as a PolicyPak Cloud Administrator

Once SSO is configured in 1Secure, return to the PolicyPak Cloud portal. Navigate to your company's administration area and use the **Add New Company Administrator** dialog to add your Entra ID or Okta user as an administrator.

Enter the user's first name, last name, and their federated email address — the same address associated with your identity provider — then click **Create**.

![Add New Company Administrator dialog in PolicyPak Cloud](/images/policypak/cloud/singlesignon/ppcloudsso4.webp)

## Step 7 – Sign In to PolicyPak Cloud with SSO

The federated administrator can now sign in to PolicyPak Cloud using their corporate identity. On first login, your identity provider may display a permissions consent prompt for the 1Secure application. Click **Accept** to grant the necessary permissions and sign in to PolicyPak Cloud.

:::note
The requested permissions cover only viewing your basic profile and maintaining access to data you have already authorized. This is a standard consent screen for OIDC-based applications.
:::

![Microsoft Entra ID permissions consent prompt on first SSO login](/images/policypak/cloud/singlesignon/ppcloudsso1.webp)

After you accept, PolicyPak Cloud redirects you and signs you in as your federated user. SSO is now fully active for your domain.

![PolicyPak Cloud portal with federated SSO user account active](/images/policypak/cloud/singlesignon/ppcloudsso2.webp)

## Summary

1. Open a Netwrix support ticket requesting PolicyPak Cloud SSO setup. Include your company name, admin email, IdP type, and domain.
2. The Netwrix internal team provisions your 1Secure tenant within 3 business days. No action required from you.
3. Accept the "Welcome to Netwrix 1Secure" invitation email and click the activation link.
4. Create your Netwrix account password when prompted.
5. Log in to [1secure.netwrix.com](https://1secure.netwrix.com/) and configure SSO using your IdP's Client ID and Client Secret.
6. Add your federated user as a Company Administrator in the PolicyPak Cloud portal.
7. Sign in to PolicyPak Cloud with your corporate SSO credentials and accept the IdP consent prompt on first login.

## Troubleshooting

If you encounter any issues at any stage of this process, reply to your existing support ticket or open a new one through the [Netwrix support portal](https://www.netwrix.com/tickets.html#/open-a-ticket). The PolicyPak Support team will assist you and coordinate with the appropriate internal team as needed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading