Skip to main content

BlastShield Documentation

Create and configure a BlastShield™ SaaS Proxy Agent
Summary

Here is a summary of the steps required for the setup.

  1. Create a BlastShield™ Exit Agent.

  2. Create the BlastShield™ proxy instance.

  3. Configure the end users

  4. Configure conditional access rules on your SaaS application.

Step 1: Create a BlastShield™ Exit Agent

You first must create a virtual machine instance to use as an Exit Agent. This is a standard BlastShield™ Agent. Typically you will run this in the cloud, eg in AWS EC2 or Azure. Once you have this up and running, you can move on to installing the Agent, as shown below. The Exit Agent will be the exit point of your proxied connections to your SaaS provider.

  1. Create an Agent in the Orchestrator and install the Agent software on your virtual instance. You can find instructions on how to do this here: Install a BlastShield™ Agent.

  2. Once the Agent is running you will see the Proxy's exit IP address shown in the PUBLIC IP ADDRESS field in the Agent Status display in the Orchestrator. This will be the IP address to use in the conditional access rules of your SaaS provider.

    Exit_Agent_Status.png
Step 2: Create the proxy instance

This is where you will configure the proxy function and link it to the Exit Agent.

  1. Go to the Orchestrator and click on the Proxies icon on the left hand menu, then click on the ADD NEW PROXY button on the right hand side.

    add-new-proxy.png
  2. The Proxy settings window will appear.

    new-proxy.png

    Configure the proxy settings as follows:

    1. Enter the name for your proxy in the Name field.

    2. Select the User group in the Groups field. This represents the groups of users who will use the proxy. You can create and modify groups in the Groups menu later if you have not already created one.

    3. Select the Agent where you want the proxied traffic to exit the BlastShield™ network in the Exit Agents field. This will be the Agent which you created in Step 1. You can enter multiple Exit Agents here, and they will all be returned to the browser.

    4. In the PROXY DOMAINS section, add the domains you wish to proxy, one at a time. Hit enter after you input each domain, and enter the next domain on the following line.

    5. Click Save to save the proxy configuration.

    An example configuration is shown below.

    configured-proxy.png
Step 3: Configure the end users

BlastShield uses Web Proxy Auto-Discovery (WPAD) protocol to deliver the proxy information to the user's web browser. On Windows web browsers this is usually enabled by default. On macOS it has to be enabled in the network settings.

  1. In the Orchestrator, verify that the target users are in the proxy user group.

    1. Choose the Groups menu on the Orchestrator and select the group which is configured in the Proxy. In the Group, verify that the correct users are listed in the MEMBERS section, and add them if necessary by clicking on the ADD MEMBERS button.

  2. On the user's computer, verify the proxy configuration.

    1. Ensure the user has 'automatic proxy discovery' enabled in their web browser. Depending on the browser and OS, this may be a system wide network setting, or a browser specific setting.

    2. Restart the user's web browser.

  3. The user should connect to BlastShield™ using the passwordless MFA.

  4. Once the user has connected to BlastShield™, their web browser will automatically detect, download and compile the proxy settings from the BlastShield™ Proxy. Websites which match the provisioned domains will be sent through the BlastShield™Exit Agent.

Step 4: Configure conditional access rules on your SaaS application.

On your SaaS application, enable conditional access rules to limit access to only connections with a source IP address of the Exit Agent used in the BlastShield™ Proxy. This is the Public IP address of the Agent from Step 1.