When using a single sign-on identity provider (IdP) for accessing Palantir Foundry, there are security best practices you should observe.
Palantir strongly advocates for proof of identity beyond the traditional use of username + password. Multi-factor authentication is mandatory for our software products. If you are using your own implementation of multi-factor authentication in your identity provider, you should require strong forms of authentication.
Examples of strong forms of authentication (in approximate order of preference):
Other forms of MFA, such as SMS-based OTPs (text message), email OTPs and two-step authentication (clicking a link), or security questions are not considered strong forms of authentication and should be disused in favor of other methods.
If you do not have mandatory multi-factor authentication on your identity provider, our products have native support for multi-factor authentication.
Palantir Foundry intentionally mandates a relatively short maximum session lifetime to force periodic re-authentication against the identity provider. As sessions tokens can be stolen by adversaries and potentially be abused for their duration, enforcing a relatively short lifespan for all user sessions provides some assurance that any misuse is time-restricted.
For the same reason, you should ensure that the lifetime of the session tokens generated by your identity provider is not overly permissive.
If you use a modern identity provider, you should enable and use Zero Trust technologies and strategies. Such technologies may include conditional access, device health or posture assessments, strong multi-factor authentication claims, and related controls. Refer to your identity provider documentation for what features are available, and how you can implement them.
Best practices for a Zero Trust security model include:
Service accounts often have broadly-permissive access to sensitive data, and tend to be poorly secured in comparison to a standard user account. This makes them attractive targets for adversaries.
Pitfalls of service account management include:
If you use service accounts with Palantir Foundry, it's critical you safeguard them to protect your data.
Best practices for service account management include:
Customers are strongly encouraged to capture and monitor their own audit logs. See Monitoring Security Audit Logs for additional guidance.
Central Auth is a Palantir-managed Microsoft Entra ID (Azure AD) identity provider. Central Auth is managed by the Palantir Information Security team, and is designed to be a security-first authentication solution for customers who do not have their own identity provider, or have not yet been able to integrate their identity provider with Foundry.
If you do not have an identity provider for your Foundry installation, we may be able to provide access via Central Auth for you. Contact your Palantir representative for more information.
Central Auth may be integrated with your Foundry installation as a SAML Multipass realm. When integrated, user account provisioning and deprovisioning is managed by Palantir. Groups, markings, and other Platform security features are still managed by you.
All Central Auth accounts must meet strict security controls: