Enterprise Integration

Integration

SUSE® Security provides multiple integration options, including a REST API, CLI, Syslog, RBAC, SAML, LDAP, and webhooks. For examples of automating tasks by using the REST API, see the Automation section.

SUSE® Security also integrates with ecosystem partners such as Sonatype (Nexus Lifecycle), IBM Cloud (QRadar and Security Advisor), and Prometheus/Grafana. Many integrations are available in the NeuVector GitHub repository.

The following integration settings are available in the SUSE® Security UI under Settings.

OpenShift and Kubernetes RBAC

Enable this option if you use Red Hat OpenShift role-based access control (RBAC) and want SUSE® Security to read and enforce those permissions automatically.

When enabled:

  • OpenShift users can sign in to the SUSE® Security console using their OpenShift credentials.

  • Users can access only the resources (projects, containers, nodes, and so on) allowed by their OpenShift role.

  • Authentication uses the OAuth 2.0 protocol.

OpenShift

Do not use the OpenShift AllowAllPasswordIdentityProvider setting. This configuration allows users to sign in with any password, which also permits access to SUSE® Security as a read-only user. It also creates a new OpenShift user for every login.

The default SUSE® Security Admin user and any users created directly in SUSE® Security remain active when OpenShift RBAC is enabled.

Trust External Root CAs with Helm

SUSE® Security can trust external root Certificate Authorities (CAs) for secure connections such as LDAPS, OpenID Connect (OIDC), and registry scanning. This capability enables trusted communication with external authentication services and image registries.

When you configure trusted root CAs through the SUSE® Security Manager UI, the CA information is stored in the internal database. No Kubernetes Secret or ConfigMap is created automatically. Because Helm manages configuration through Kubernetes resources, this setting cannot be managed through Helm by default.

To configure trusted root CAs by using Helm, create a custom ConfigMap that provides the CA certificates and enables TLS verification.

  1. Create an override file.

    Create an override.yaml file that includes the CA certificate and TLS settings:

    controller:
      configmap:
        enabled: true
        data:
          sysinitcfg.yaml: |
            cacerts:
            - -----BEGIN CERTIFICATE-----
              MIID0zCCArugAwIBAgIU...
              -----END CERTIFICATE-----
            enable_tls_verification: true
  2. Deploy SUSE® Security with Helm.

    Deploy SUSE® Security by using the override file:

    helm install neuvector neuvector/core \
      -n neuvector \
      --set manager.svc.type=NodePort,imagePullSecrets=regsecret \
      -f override.yaml

    After deployment, Helm reports a successful installation.

Verify the configuration.

+ Confirm that the configuration is applied by inspecting the neuvector-init ConfigMap:

+

kubectl get cm neuvector-init -o yaml

+ Verify that the CA certificate and enable_tls_verification setting appear in the output.

+

After installation, verify that SUSE® Security is running and accessible:

NODE_PORT=$(kubectl get -n neuvector -o jsonpath="{.spec.ports[0].nodePort}" svc neuvector-service-webui)
NODE_IP=$(kubectl get nodes -o jsonpath="{.items[0].status.addresses[0].address}")
echo https://$NODE_IP:$NODE_PORT

Open the displayed URL in a browser to access the SUSE® Security Manager UI.

Kubernetes RBAC

To manually configure Kubernetes RBAC for specific namespaces:

  1. Go to SettingsUsersAdd User.

  2. Open Advanced Settings.

  3. Specify the namespaces that the user can access in SUSE® Security.

Kubernetes

Syslog

Configure Syslog integration by entering the Syslog server address and selecting the notification level. You can use an IP address or DNS name and choose either UDP or TCP.

Webhooks

SUSE® Security can send notifications to an external endpoint by using webhooks. Specify the webhook endpoint URL to receive notifications.

You can configure webhook notifications for custom events under PolicyResponse Rules.

Directory and SSO Integration

SUSE® Security supports directory and single sign-on (SSO) integrations, including LDAP, Microsoft Active Directory, SAML, and OpenID Connect.

For information about predefined and custom roles that can be mapped during integration, see Users and Roles.