|
| 1 | +--- |
| 2 | +title: Integrate with KnowBe4 |
| 3 | +sidebar_label: KnowBe4 |
| 4 | +support_level: community |
| 5 | +--- |
| 6 | + |
| 7 | +## What is KnowBe4 |
| 8 | + |
| 9 | +> KnowBe4 is a security awareness and phishing simulation platform that helps organizations train employees to recognize and respond to social engineering attacks. |
| 10 | +> |
| 11 | +> -- https://knowbe4.com/ |
| 12 | +
|
| 13 | +## Preparation |
| 14 | + |
| 15 | +The following placeholders are used in this guide: |
| 16 | + |
| 17 | +- `authentik.company` is the FQDN of the authentik installation. |
| 18 | + |
| 19 | +:::info |
| 20 | +This documentation lists only the settings that you need to change from their default values. Changing settings not mentioned in this guide can prevent single sign-on from working correctly. |
| 21 | +::: |
| 22 | + |
| 23 | +## KnowBe4 configuration |
| 24 | + |
| 25 | +1. Sign in to the KnowBe4 Admin Console. |
| 26 | +2. Navigate to **Account Integrations** > **SAML**. |
| 27 | +3. Enable the options that match your deployment requirements. A common configuration enables: |
| 28 | + - **Enable SAML SSO** |
| 29 | + - **Disable non-SAML Logins for All Users** |
| 30 | + - **Allow Admins w/MFA to Bypass SAML Login** |
| 31 | + - **Allow Account Creation from SAML Login** |
| 32 | +4. Provide the authentik endpoints and certificate details: |
| 33 | + - **IdP SSO Target URL**: `https://authentik.company/application/saml/<application_slug>/sso/binding/redirect/` |
| 34 | + - **IdP Cert Fingerprint**: the SHA-256 thumbprint of the authentik signing certificate you will use for this integration (recorded in authentik under **System** > **Certificates**). |
| 35 | +5. Note the read-only values displayed by KnowBe4; you will copy these into authentik: |
| 36 | + - **Entity ID** |
| 37 | + - **SSO Callback (ACS) URL** |
| 38 | + |
| 39 | +## authentik configuration |
| 40 | + |
| 41 | +Create a SAML application and provider in authentik using the values supplied by KnowBe4. |
| 42 | + |
| 43 | +### Create an application and provider in authentik |
| 44 | + |
| 45 | +1. Log in to authentik as an administrator and open the authentik Admin interface. |
| 46 | +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. |
| 47 | + |
| 48 | +- **Application**: provide a descriptive name such as `KnowBe4`, optionally assign a group, choose a policy engine mode, and configure any UI settings. Record the **slug** because it is used in the IdP URLs you entered in KnowBe4. |
| 49 | +- **Choose a Provider type**: select **SAML Provider**. |
| 50 | +- **Configure the Provider**: |
| 51 | + - Provide a name (or accept the auto-generated value) and select the authorization flow to use. |
| 52 | + - Set the **ACS URL** to the **SSO Callback (ACS) URL** displayed in KnowBe4. |
| 53 | + - Set the **Issuer** to the **Entity ID** shown in KnowBe4. |
| 54 | + - Set the **Audience** to the same **Entity ID** value. |
| 55 | + - Set the **Service Provider Binding** to `Post`. |
| 56 | + - Under **Advanced protocol settings**, choose any available certificate as the **Signing Certificate**, enable **Sign Assertions**. The certificate you select is the one whose SHA-256 thumbprint you entered in KnowBe4. |
| 57 | +- **Configure Bindings** _(optional)_: create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to control which users see the KnowBe4 application on the **My Applications** page. |
| 58 | + |
| 59 | +3. Click **Submit** to save the application and provider. |
| 60 | + |
| 61 | +:::note |
| 62 | +If SSO misconfiguration locks you out and you enabled **Allow Admins w/MFA to Bypass SAML Login**, use the **Bypass-SSO Login URL** displayed in KnowBe4 to authenticate with your credentials and fix or disable the SAML settings. |
| 63 | +::: |
| 64 | + |
| 65 | +## Configuration verification |
| 66 | + |
| 67 | +1. Open a new browser session (or private window) and browse to `https://de.knowbe4.com/` (replace with your regional KnowBe4 portal if different). |
| 68 | +2. Enter your business email address, and click **Next**. |
| 69 | +3. Confirm that you are redirected to authentik for authentication. Sign in with an account permitted to access KnowBe4. |
| 70 | +4. After successful authentication, verify that you return to the KnowBe4 console without being prompted for additional credentials. |
0 commit comments