Preferences
The Preferences section contains platform-wide configuration settings for your Prism organization. These settings control admin roles, automated provisioning, API access, data replication, and log exports.
Preference Categories
| Category | Description | Link |
|---|---|---|
| Admin Management | Manage admin accounts, session timeouts, and CloudTrail access | Admin Management |
| SCIM Configuration | Configure SCIM provisioning for automated user and group synchronization | SCIM Configuration |
| API Tokens | Create and manage API tokens for programmatic access (e.g., Terraform) | API Tokens |
| Replication | Import users, groups, and assignments from AWS IAM Identity Center into Prism | Replication |
| Log Export Settings | Configure automated audit & access log export to Amazon S3 | Log Export Settings |
Overview
Admin Management
Control who has admin access to Prism, manage MFA enforcement, set SSO session timeouts, and toggle CloudTrail access for individual admins. See Admin Management.
SCIM Configuration
Set up SCIM (System for Cross-domain Identity Management) to automatically provision and deprovision users and groups from your identity provider. See SCIM Configuration.
API Tokens
Generate API tokens for programmatic access to Prism's API, particularly for use with the Prism Terraform provider. See API Tokens.
Replication
The initial import that pulls your existing users, groups, and permission set assignments from AWS IAM Identity Center into Prism for every account in your AWS organization. Before running replication you must configure your Management Account (the AWS account hosting your IAM Identity Center instance) by providing its 12-digit Account ID and SSO Region. Once triggered, Prism reads all resources from IAM Identity Center and imports them into its database, giving you a complete, centralized view of your current access configuration. This is typically a one-time step performed during initial onboarding.
Log Export Settings
Configure automated export of audit and access logs to an Amazon S3 bucket for long-term storage and compliance. See Log Export Settings.
Replication is the first step after configuring your management account. It imports your existing AWS IAM Identity Center data into Prism so you can begin managing it.
Admin Management
Manage administrator accounts, and session configuration for your Prism organization. This page allows you to promote users to admin roles, control CloudTrail access, and configure SSO session timeouts.
Prerequisites
- You must be logged in as a Super Admin. The initial Super Admin account is created during onboarding by navigating to your organization's Prism URL at
/init(e.g.,https://yourcompany.prism.cloudkeeper.com/init).
Admin Table
The Admin Management page displays a table of all admin-level users.
Available Actions
Promote a User to Admin
Elevate an existing user to an admin role:
- Navigate to Admin Portal > Preferences > Admin Management.
- Click the Promote User button.
- Select the user you want to promote.
- Choose the admin role to assign.
- Click Confirm to promote the user.
Granting admin access gives the user full control over your Prism organization, including the ability to manage all users, groups, permission sets, assignments, and accounts. Only promote trusted users.
Demote an Admin
Remove admin privileges from a user:
- Locate the admin in the admin table.
- Click the Demote action on the admin's row.
- Confirm the demotion.
The user will revert to their previous non-admin role and lose access to the Admin Portal.
Toggle CloudTrail Access
Control whether an admin can access the CloudTrail:
- Locate the admin in the admin table.
- Click the CloudTrail Access toggle on the admin's row.
- The toggle switches between enabled and disabled.
Change Password
Update an admin's password:
- Locate the admin in the admin table.
- Click the Change Password action.
- Enter the new password.
- Click Save.
SSO Session Timeout
Configure how long SSO sessions remain active before requiring re-authentication.
Step-by-Step Guide
- Navigate to Admin Portal > Preferences > Admin Management.
- Locate the SSO Session Timeout setting.
- Select the desired timeout duration from the dropdown:
| Duration | Description |
|---|---|
| 30 minutes | Short sessions for high-security environments |
| 1 hour | Standard for sensitive operations |
| 4 hours | Suitable for regular workday use |
| 8 hours | Full workday session |
| 12 hours | Default. Extended session for convenience |
- Click Save to apply the timeout setting.
Balance security and convenience when setting the session timeout. Shorter timeouts are more secure but require more frequent re-authentication. The default of 12 hours works well for most organizations.
What Happens Next
Changes to admin roles and settings take effect immediately in Prism.
SCIM Configuration
Configure SCIM (System for Cross-domain Identity Management) provisioning to automatically synchronize users and groups from your identity provider to Prism. SCIM eliminates the need to manually create and manage user accounts.
Prerequisites
- Your identity provider must support SCIM 2.0 (e.g., Okta, Azure AD, OneLogin).
Overview
SCIM provisioning creates a bridge between your identity provider and Prism. When you add, update, or remove a user in your identity provider, the change is automatically reflected in Prism through the SCIM protocol.
SCIM Token Management
SCIM authentication uses Bearer tokens. You can manage tokens from the SCIM Configuration page.
Token Table
| Column | Description |
|---|---|
| Token | The SCIM token (masked for security; only shown in full at creation time) |
| Created Date | When the token was generated |
| Expiration | When the token expires (if an expiry was set) |
| Status | Current token status: Active, Expired, or Revoked |
| Actions | Available actions (Revoke, Delete) |
Generate a SCIM Token
- Navigate to Admin Portal > Preferences > SCIM Configuration.
- Click the Generate Token button.
- Optionally, set an expiry date for the token. If no expiry is set, the token remains valid until revoked.
- Click Generate.
- The new token is displayed. Copy it immediately -- it will not be shown again.
The SCIM token is only displayed once at creation time. Copy and securely store the token before closing the dialog. If you lose the token, you must generate a new one.
Revoke a Token
- Locate the token in the token table.
- Click the Revoke action.
- The token status changes to Revoked and can no longer be used for authentication.
Delete a Token
- Locate the token in the token table.
- Click the Delete action.
- The token is permanently removed from the table.
SCIM Configuration Details
After generating a token, configure your identity provider with the following details:
| Setting | Value |
|---|---|
| SCIM Base URL | Displayed on the configuration page. Click the Copy button to copy it to your clipboard. |
| Authentication Method | Bearer Token |
| Bearer Token | The token generated in the previous step |
The SCIM Base URL is unique to your Prism organization. It is pre-populated on the configuration page and should be copied directly into your identity provider's SCIM settings.
Configuring Common Identity Providers
Okta
- In Okta, navigate to your application's Provisioning tab.
- Click Configure API Integration.
- Enter the SCIM Base URL and Bearer Token.
- Enable the provisioning features: Push Users and Push Groups.
Azure AD / Microsoft Entra ID
Step 1: Create a New Enterprise Application
- In the Azure Portal, navigate to Microsoft Entra ID > Enterprise Applications.
- Click + New Application.
- Click + Create your own application.
- Enter a name for the application (e.g., "Prism SCIM Provisioning").
- Select "Integrate any other application you don't find in the gallery (Non-gallery)".
- Click Create.
Step 2: Configure Provisioning
- In the newly created Enterprise Application, go to Provisioning.
- Click New provisioning configuration.
- Under Admin Credentials, fill in the following:
- Select authentication method: Choose Bearer authentication.
- Tenant URL: Paste the SCIM Base URL copied from the Prism SCIM Configuration page.
- Secret Token: Paste the SCIM token generated from the Prism SCIM Configuration page.
- Click Test Connection to verify that Azure AD can connect to the Prism SCIM endpoint.
- Once the connection test succeeds, click Create.
Step 3: Configure Provisioning Settings
After creating the configuration, you will be taken to the configuration details page:
- Set Provisioning Mode to Automatic.
- Under Mappings, configure attribute mappings for users and groups as needed.
- Under Settings, set the Scope to control which users are synced:
- Sync only assigned users and groups -- Only users and groups assigned to the Enterprise Application will be provisioned.
- Sync all users and groups -- All users and groups in the directory will be provisioned.
Step 4: Assign Users/Groups and Start Provisioning
- Navigate to Users and groups in the Enterprise Application.
- Click + Add user/group and assign the users or groups you want to provision to Prism.
- Go back to Provisioning and set Provisioning Status to On.
- Click Save.
Use Provision on demand to test provisioning with a single user before enabling full sync for your organization.
What Happens Next
After configuring SCIM:
- Your identity provider begins syncing users and groups to Prism automatically.
- New users created in the identity provider are provisioned in Prism.
- User attribute updates in the identity provider are reflected in Prism.
- Users deactivated or deleted in the identity provider are deactivated or removed in Prism.
- SCIM-provisioned users and groups are available in Prism for access management.
After initial SCIM setup, perform a test sync with a single user to verify that provisioning works correctly before enabling sync for the entire organization.
API Tokens
Create and manage API tokens for programmatic access to Prism's API. API tokens carry admin-level access and are primarily used with the Prism Terraform provider to create and manage resources such as users, groups, permission sets, assignments, and accounts through infrastructure-as-code workflows.
Overview
API tokens provide a secure way to authenticate with Prism's API without using interactive login credentials. Each token grants admin-level access, allowing full management of Prism resources.
Token Table
The API Tokens page displays a table of all tokens created by the current admin.
Creating an API Token
Step-by-Step Guide
- Navigate to Admin Portal > Preferences > API Tokens.
- Click the Create Token button.
- Enter a Description for the token. Use a description that identifies the token's purpose (e.g., "Terraform CI/CD Pipeline", "Monitoring Script").
- Click Create.
- The newly created token is displayed. Copy it immediately -- it will not be shown again.
- Click the Copy button to copy the token to your clipboard.
Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
| Description | Text | Yes | A human-readable description of the token's purpose. Helps identify tokens in the table. |
The API token is only displayed once at creation time. Copy and securely store the token before closing the dialog. If you lose the token, you must delete it and create a new one.
Deleting an API Token
- Locate the token in the token table.
- Click the Delete button on the token's row.
- Confirm the deletion.
The token is permanently deleted and can no longer be used for authentication. Any scripts or pipelines using this token will fail.
Deleting a token immediately revokes access. Any automation (Terraform pipelines, scripts, integrations) using this token will stop working. Ensure you update those systems with a new token before deleting the old one.
Using API Tokens
With the Prism Terraform Provider
API tokens are the recommended authentication method for the Prism Terraform provider:
provider "prism" {
api_token = var.prism_api_token
}
Never hardcode API tokens in Terraform files or source code. Use environment variables or a secrets manager:
export PRISM_API_TOKEN="your-token-here"
provider "prism" {
api_token = env("PRISM_API_TOKEN")
}
Security Best Practices
- One token per use case -- Create separate tokens for each integration, pipeline, or script. This limits the blast radius if a token is compromised.
- Use descriptive names -- Name tokens after their purpose so you can identify and manage them easily.
- Rotate tokens regularly -- Periodically create new tokens and phase out old ones.
- Store tokens securely -- Use a secrets manager (AWS Secrets Manager, HashiCorp Vault, etc.) rather than storing tokens in plain text.
- Monitor usage -- Check the "Last Used" column to identify unused tokens that should be deleted. Token usage can also be verified in the Audit Logs.
Replication
Replication is the initial import process that pulls your existing users, groups, and assignments from AWS IAM Identity Center into Prism for all accounts in your AWS organization. This is a critical first step that populates Prism with your current IAM Identity Center configuration so you can begin managing it.
Prerequisites
- The Management Account must be configured (see below).
Overview
When you first set up Prism, your AWS IAM Identity Center already contains users, groups, and assignments. Replication reads this data from AWS and imports it into Prism's database, giving you a complete view of your organization's access configuration.
Overview Cards
The Replication page displays overview cards showing the current state of your organization:
| Card | Description |
|---|---|
| AWS Accounts | Total number of AWS accounts in your organization |
| Users | Total number of users |
| Groups | Total number of groups |
| Permission Sets | Total number of permission sets |
| Assignments | Total number of assignments |
These counts give you a quick overview of what will be replicated.
Management Account Configuration
Before running replication, you must configure the Management Account -- the AWS account that hosts your AWS instance.
Configuration Fields
| Field | Type | Required | Description |
|---|---|---|---|
| AWS Account ID | Text (12 digits) | Yes | The 12-digit ID of the AWS account that contains your IAM Identity Center instance. |
| SSO Region | Dropdown | Yes | The AWS region where IAM Identity Center is deployed. Choose from 25 supported regions. |
| Description | Text | No | An optional description for the management account configuration. |
Supported SSO Regions
The SSO Region dropdown includes all 25 AWS regions where IAM Identity Center is available, including:
us-east-1(N. Virginia)us-east-2(Ohio)us-west-2(Oregon)eu-west-1(Ireland)eu-central-1(Frankfurt)ap-southeast-1(Singapore)ap-northeast-1(Tokyo)- And 18 additional regions.
Step-by-Step Guide
- Navigate to Admin Portal > Preferences > Replication.
- In the Management Account section, enter:
- AWS Account ID -- The 12-digit ID of your management account.
- SSO Region -- Select the region where IAM Identity Center is deployed.
- Description -- Optionally, add a description.
- Click Save to store the management account configuration.
Running Replication
Replication imports all resources -- users, groups, and assignments -- from AWS IAM Identity Center into Prism for all accounts in your AWS organization.
Step-by-Step Guide
- Navigate to Admin Portal > Preferences > Replication.
- Review the overview cards to understand the scope of the replication.
- Click the Run Full Replication button.
- The replication process begins. This may take a minute or two depending on the number of resources in your AWS organization.
- When complete, result cards are displayed showing the outcome.
Replication Results
After replication completes, result cards are displayed for each resource type:
| Result | Description |
|---|---|
| Success | Resources that were successfully imported |
| Failed | Resources that failed to import (with error details) |
| Skipped | Resources that were already up-to-date in Prism |
| Total | The total number of resources processed |
Result cards are shown for each resource type:
- Users
- Groups
- Assignments
If any resources show as Failed, review the error details and fix the underlying issues before running replication again. Common causes include connectivity issues with AWS or insufficient permissions on the management account role.
When to Run Replication
Run Replication during initial setup to import your existing AWS IAM Identity Center configuration into Prism. This is typically a one-time process when first onboarding your organization.
Log Export Settings
Configure automated export of audit and access logs to an Amazon S3 bucket. Log exports enable long-term log retention for compliance, auditing, and security analysis.
Prerequisites
- You must have an Amazon S3 bucket where logs will be stored.
- The S3 bucket must be accessible from Prism (appropriate IAM permissions and bucket policy).
Step-by-Step Guide
Configuring Log Export
- Navigate to Admin Portal > Preferences > Log Export Settings.
- Fill in the export configuration:
- S3 Bucket Name -- Enter the name of the S3 bucket where logs will be stored. The bucket must exist and have proper permissions.
- Path Prefix (optional) -- Enter an optional prefix for the log files. Files will be stored as
{prefix}/audit-logs/YYYY-MM-DD.jsonand{prefix}/access-logs/YYYY-MM-DD.json. - Export Time (UTC) -- Set the daily export time in HH:MM format (24-hour, UTC). Default is 02:00 UTC.
- Click Test Connection to verify that Prism can connect to and write to the S3 bucket.
- Click Save Configuration to save the settings.
- Optionally, click Trigger Export Now to run an immediate export.
Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
| S3 Bucket Name | Text | Yes | The name of the Amazon S3 bucket where logs will be exported. Must be an existing bucket with proper permissions. |
| Path Prefix | Text | No | An optional prefix (folder path) for the log files within the bucket. Files are stored as {prefix}/audit-logs/YYYY-MM-DD.json and {prefix}/access-logs/YYYY-MM-DD.json. |
| Export Time (UTC) | Time (HH:MM) | No | The daily export time in 24-hour UTC format. Default is 02:00 UTC. |
Available Actions
| Action | Description |
|---|---|
| Test Connection | Verifies that Prism can connect to and write to the specified S3 bucket. Run this before saving to confirm everything is set up correctly. |
| Save Configuration | Saves the current log export settings. |
| Trigger Export Now | Triggers an immediate log export, independent of the scheduled daily export. Useful for testing or exporting logs on demand. |
Last Export
The page displays the most recent export status, including the date/time and whether it succeeded or failed.
What Happens Next
After configuring log exports:
- Logs are automatically exported to the specified S3 bucket on the configured schedule (daily).
- Each export includes all new audit and access log entries since the last export.
- Log files are stored in the S3 bucket with the configured prefix.
- You can query exported logs using tools like Amazon Athena, AWS CloudTrail Lake, or any S3-compatible analytics tool.
Use a meaningful S3 key prefix to organize logs by environment or date. For example: prism-logs/production/ or logs/prism/.
Ensure the S3 bucket has appropriate retention policies and access controls. Log data may contain sensitive information about user activity and access patterns.
S3 Bucket Setup
To ensure Prism can export logs to your S3 bucket:
- Create an S3 bucket (or use an existing one).
- Ensure the bucket policy allows Prism to write objects (PutObject).
- Optionally, configure S3 lifecycle rules for log rotation and archival.
- Optionally, enable S3 server-side encryption for data-at-rest protection.