Skip to content

Commit 5586fab

Browse files
committed
New Integration Guide KnowBe4
1 parent 754425a commit 5586fab

File tree

1 file changed

+70
-0
lines changed
  • website/integrations/security/knowbe4

1 file changed

+70
-0
lines changed
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Integrate with KnowBe4
3+
sidebar_label: KnowBe4
4+
support_level: community
5+
---
6+
7+
## What is KnowBe4
8+
9+
> KnowBe4 is a security awareness and phishing simulation platform that helps organizations train employees to recognize and respond to social engineering attacks.
10+
>
11+
> -- https://knowbe4.com/
12+
13+
## Preparation
14+
15+
The following placeholders are used in this guide:
16+
17+
- `authentik.company` is the FQDN of the authentik installation.
18+
19+
:::info
20+
This documentation lists only the settings that you need to change from their default values. Changing settings not mentioned in this guide can prevent single sign-on from working correctly.
21+
:::
22+
23+
## KnowBe4 configuration
24+
25+
1. Sign in to the KnowBe4 Admin Console.
26+
2. Navigate to **Account Integrations** > **SAML**.
27+
3. Enable the options that match your deployment requirements. A common configuration enables:
28+
- **Enable SAML SSO**
29+
- **Disable non-SAML Logins for All Users**
30+
- **Allow Admins w/MFA to Bypass SAML Login**
31+
- **Allow Account Creation from SAML Login**
32+
4. Provide the authentik endpoints and certificate details:
33+
- **IdP SSO Target URL**: `https://authentik.company/application/saml/<application_slug>/sso/binding/redirect/`
34+
- **IdP Cert Fingerprint**: the SHA-256 thumbprint of the authentik signing certificate you will use for this integration (recorded in authentik under **System** > **Certificates**).
35+
5. Note the read-only values displayed by KnowBe4; you will copy these into authentik:
36+
- **Entity ID**
37+
- **SSO Callback (ACS) URL**
38+
39+
## authentik configuration
40+
41+
Create a SAML application and provider in authentik using the values supplied by KnowBe4.
42+
43+
### Create an application and provider in authentik
44+
45+
1. Log in to authentik as an administrator and open the authentik Admin interface.
46+
2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair.
47+
48+
- **Application**: provide a descriptive name such as `KnowBe4`, optionally assign a group, choose a policy engine mode, and configure any UI settings. Record the **slug** because it is used in the IdP URLs you entered in KnowBe4.
49+
- **Choose a Provider type**: select **SAML Provider**.
50+
- **Configure the Provider**:
51+
- Provide a name (or accept the auto-generated value) and select the authorization flow to use.
52+
- Set the **ACS URL** to the **SSO Callback (ACS) URL** displayed in KnowBe4.
53+
- Set the **Issuer** to the **Entity ID** shown in KnowBe4.
54+
- Set the **Audience** to the same **Entity ID** value.
55+
- Set the **Service Provider Binding** to `Post`.
56+
- Under **Advanced protocol settings**, choose any available certificate as the **Signing Certificate**, enable **Sign Assertions**. The certificate you select is the one whose SHA-256 thumbprint you entered in KnowBe4.
57+
- **Configure Bindings** _(optional)_: create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to control which users see the KnowBe4 application on the **My Applications** page.
58+
59+
3. Click **Submit** to save the application and provider.
60+
61+
:::note
62+
If SSO misconfiguration locks you out and you enabled **Allow Admins w/MFA to Bypass SAML Login**, use the **Bypass-SSO Login URL** displayed in KnowBe4 to authenticate with your credentials and fix or disable the SAML settings.
63+
:::
64+
65+
## Configuration verification
66+
67+
1. Open a new browser session (or private window) and browse to `https://de.knowbe4.com/` (replace with your regional KnowBe4 portal if different).
68+
2. Enter your business email address, and click **Next**.
69+
3. Confirm that you are redirected to authentik for authentication. Sign in with an account permitted to access KnowBe4.
70+
4. After successful authentication, verify that you return to the KnowBe4 console without being prompted for additional credentials.

0 commit comments

Comments
 (0)