You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md
+7-22Lines changed: 7 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Configuring SSO for Aruba Central and HPE GreenLake using Okta
3
-
date: 2023-02-14T20:11:58.846Z
3
+
date: 2024-03-26T19:04:06.778Z
4
4
externalLink: ""
5
5
author: "Will Smith - Consulting Systems Engineer (ACEX #34)"
6
6
authorimage: /img/willsmith-sm.jpg
@@ -73,17 +73,17 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
73
73
74
74

75
75
76
-

76
+

77
77
78
78

79
79
80
-
The **hpe\_ccs\_attribute** always starts with version_1#. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL_SCOPES**.
80
+
The **hpe\__ccs\__attribute** always starts with `version_1#`. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL\_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL\_SCOPES**.
If you want to add additional HPE GreenLake applications, or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below.
89
89
@@ -104,39 +104,30 @@ Click Next and Select “Internal App”, then Finish.
104
104
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
1. Log into HPE GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
116
113
117
114
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into HPE GreenLake with an account from that domain in order to enable SSO for it.*
118
115
119
116

120
-
121
117
2. Type in the domain you want to enable SSO on:
122
118
123
119

124
-
125
120
3. Input the metadata from the step above.
126
121
127
122
While HPE GreenLake does support entering this information manually, it's recommended that you simply upload the XML metadata that was downloaded in the previous step. To do so, Select Metadata File, selecting the XML file. Then, click Next.
128
123
129
124

130
-
131
125
4. Enter the SAML attributes to match what was entered in Okta. Set the idle timeout value as well.
132
126
133
127

134
-
135
128
5. Then click Next.
136
-
137
129
6. Create a recover user so that, in the event SSO fails, an admin will still be able to access the HPE GreenLake portal.
138
130
139
-
140
131

141
132
142
133
Congratulations! SSO will now be enabled for HPE GreenLake as well as the Aruba Central application. Log out and on the HPE GreenLake home page, click **Sign in with SSO**.
@@ -154,13 +145,7 @@ Enter the SSO credentials. You will be redirected to Okta to authenticate. Once
154
145
**Additional notes:**
155
146
156
147
* There must be at least **one** verified user belonging to the **Domain** prior to configuration.
157
-
158
148
* In order to configure SSO, you must be logged into HPE GreenLake with a user from the domain.
159
-
160
-
* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP.
161
-
149
+
* SSO user access is determined by the “role_name” attribute included in the SAML hpe\_ccs\_attribute provided by the IdP.
162
150
* SSO users can initiate a Single Sign On request by trying to log into Aruba Central (SP-initiated login).
163
-
164
-
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
165
-
166
-
151
+
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
0 commit comments