website/integrations/security/push-security/index.mdx
Push Security is a browser-based identity security platform that hardens and monitors your identity attack surface. Security teams can monitor and secure their entire identity attack surface (ISPM) and detect and block identity-based attacks (ITDR) such as advanced phishing techniques.
The following placeholders are used in this guide:
authentik.company is the FQDN of the authentik installation.:::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
To support the integration of Push Security, you need to create property mappings and an application/provider pair in authentik.
Push Security requires separate first and last names for each user, but authentik provides the full name as a single string. To address this, create property mappings that split the full name into first and last names.
Log in to authentik as an administrator and open the authentik Admin interface.
Navigate to Customization > Property Mappings and click Create.
Name: givenname
SAML Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Expression:
return request.user.name.rsplit(" ", 1)[0]
Click Finish.
Click Create to create the second property mapping.
Name: familyname
SAML Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Expression:
return request.user.name.rsplit(" ", 1)[-1]
Click Finish.
https://temp.tempPost.givenname and familyname property mappings created in the previous section.https://authentik.company/application/saml/<application_slug>/sso/binding/post/https://login.pushsecurity.com/login/callback?connection=saml-aaa...).urn:auth0:production-pushsecurity:saml-aaa...).:::info To enable users to enter their email on the Push Security login screen and be redirected to authentik, you will need to contact Push Security to enable the feature. This can be done from the Push Security admin console via Settings > Organization > SAML Configuration. :::
To confirm that authentik is properly configured with Push Security, navigate to the authentik dashboard, and click on the Push Security application. You should be redirected to the Push Security admin console.