Skip to content

Commit 01fbdb3

Browse files
authored
Merge pull request #2426 from WifiGuyWill/cms/WifiGuyWill/hpe-dev-portal/blog/okta-sso-integration-for-green-lake-and-aruba-central
Update Blog “okta-sso-integration-for-green-lake-and-aruba-central”
2 parents acc357a + 89fce84 commit 01fbdb3

File tree

2 files changed

+7
-22
lines changed

2 files changed

+7
-22
lines changed

content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md

Lines changed: 7 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configuring SSO for Aruba Central and HPE GreenLake using Okta
3-
date: 2023-02-14T20:11:58.846Z
3+
date: 2024-03-26T19:04:06.778Z
44
externalLink: ""
55
author: "Will Smith - Consulting Systems Engineer (ACEX #34)"
66
authorimage: /img/willsmith-sm.jpg
@@ -73,17 +73,17 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
7373

7474
![](/img/ws-image3.png)
7575

76-
![](/img/ws-image4.png)
76+
![](/img/ws-image17.png)
7777

7878
![](/img/ws-image5.png)
7979

80-
The **hpe\_ccs\_attribute** always starts with version_1#. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL_SCOPES**.
80+
The **hpe\__ccs\__attribute** always starts with `version_1#`. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL\_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL\_SCOPES**.
8181

8282
Example:
8383

84-
**version_1#5b0ec0e8c4f422eca232ba72799953ac:00000000-0000-0000-0000-000000000000:Account Administrator:ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:**
84+
**version_1#5b0ec0e8c4f422eca232ba72799953ac:00000000-0000-0000-0000-000000000000:Account Administrator:ALL\__SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:**
8585

86-
**Aruba Central Administrator:ALL_SCOPES**
86+
**Aruba Central Administrator:ALL\_SCOPES**
8787

8888
If you want to add additional HPE GreenLake applications, or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below.
8989

@@ -104,39 +104,30 @@ Click Next and Select “Internal App”, then Finish.
104104
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
105105

106106
![](/img/ws-image9.png)
107-
108107
2. Click Next.
109-
110108
3. Select Internal app, and Click Finish.
111109

112-
113110
**Step 4: Create SAML Authorization Profile in HPE GreenLake Cloud Platform**
114111

115112
1. Log into HPE GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
116113

117114
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into HPE GreenLake with an account from that domain in order to enable SSO for it.*
118115

119116
![](/img/ws-image10.png)
120-
121117
2. Type in the domain you want to enable SSO on:
122118

123119
![](/img/ws-image11.png)
124-
125120
3. Input the metadata from the step above.
126121

127122
While HPE GreenLake does support entering this information manually, it's recommended that you simply upload the XML metadata that was downloaded in the previous step. To do so, Select Metadata File, selecting the XML file. Then, click Next.
128123

129124
![](/img/ws-image12.png)
130-
131125
4. Enter the SAML attributes to match what was entered in Okta. Set the idle timeout value as well.
132126

133127
![](/img/ws-image13.png)
134-
135128
5. Then click Next.
136-
137129
6. Create a recover user so that, in the event SSO fails, an admin will still be able to access the HPE GreenLake portal.
138130

139-
140131
![](/img/ws-image14.png)
141132

142133
Congratulations! SSO will now be enabled for HPE GreenLake as well as the Aruba Central application. Log out and on the HPE GreenLake home page, click **Sign in with SSO**.
@@ -154,13 +145,7 @@ Enter the SSO credentials. You will be redirected to Okta to authenticate. Once
154145
**Additional notes:**
155146

156147
* There must be at least **one** verified user belonging to the **Domain** prior to configuration.
157-
158148
* In order to configure SSO, you must be logged into HPE GreenLake with a user from the domain.
159-
160-
* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP.
161-
149+
* SSO user access is determined by the “role_name” attribute included in the SAML hpe\_ccs\_attribute provided by the IdP.
162150
* SSO users can initiate a Single Sign On request by trying to log into Aruba Central (SP-initiated login).
163-
164-
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
165-
166-
151+
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>

static/img/ws-image17.png

163 KB
Loading

0 commit comments

Comments
 (0)