Skip to content

Commit 3281921

Browse files
committed
Update Blog “okta-sso-integration-for-green-lake-and-aruba-central”
1 parent dcf067f commit 3281921

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
4141

4242
![](/img/ws-image1.png)
4343

44-
**Step 2: Configure Single Sign On settings**
44+
**Step 2: How to configure Single Sign On settings**
4545

4646
1. Enter the SAML information.
4747

@@ -65,7 +65,7 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
6565

6666
See here for IdP attribute details: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
6767

68-
One of the additional features added as part of the GreenLake platform is Role Based Access Controls (RBAC) for Aruba Central and all other apps in GLCP. A new SAML attribute has been added “hpe_ccs_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
68+
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe\_ccs\_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
6969

7070
![](/img/ws-image2.png)
7171

@@ -75,15 +75,15 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
7575

7676
![](/img/ws-image5.png)
7777

78-
The **hpe\_ccs\_attribute** will always start with **version_1#**. First, we’ll configure the attributes for GreenLake CCS, then Central. First enter the PCID for the account, followed by the GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Then followed by the role name and **ALL_SCOPES**. Next will be the Aruba Central info. Start with the **app cid**, then the role name (IE Aruba Central Administrator) then **ALL_SCOPES**.
78+
The **hpe\_ccs\_attribute** always starts with version_1#. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL_SCOPES**.
7979

8080
Example:
8181

8282
**version_1#5b0ec0e8c4f422eca232ba72799953ac:00000000-0000-0000-0000-000000000000:Account Administrator:ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:**
8383

8484
**Aruba Central Administrator:ALL_SCOPES**
8585

86-
If you want to add additional GreenLake applications or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below.
86+
If you want to add additional HPE GreenLake applications, or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below.
8787

8888
![](/img/ws-image6.png)
8989

@@ -97,27 +97,27 @@ Click Next and Select “Internal App” then Finish
9797

9898
1. Click Next – Configure the Sign On settings
9999

100-
Two options available: **View Setup Instructions** which steps through the SAML config or **Identity Provider metadata** will produce an XML that can be loaded into Aruba Central.
100+
You will find two options are available: **View Setup Instructions** which steps you through the SAML configuration and **Identity Provider metadata**, which will produce an XML file that can be loaded into Aruba Central.
101101

102102
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
103103

104104
![](/img/ws-image9.png)
105105
2. Click Next
106-
3. Select Internal app and Click Finish
106+
3. Select Internal app, and Click Finish
107107

108-
**Step 4: Create SAML Authorization Profile in GreenLake Cloud Platform**
108+
**Step 4: Create SAML Authorization Profile in HPE GreenLake Cloud Platform**
109109

110-
1. Log into GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
110+
1. Log into HPE GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
111111

112-
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for that domain.*
112+
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for it.*
113113

114114
![](/img/ws-image10.png)
115115
2. Type in the domain you want to enable SSO on:
116116

117117
![](/img/ws-image11.png)
118-
3. Input the metadata from the above step
118+
3. Input the metadata from the step above.
119119

120-
While GreenLake does support manually entering this info, its recommended to simply upload the XML metadata that was downloaded in the previous step. Select Metadata File and select the XML. Then click Next.
120+
While HPE GreenLake does support entering this information manually, it's recommended that you simply upload the XML metadata that was downloaded in the previous step. To do so, Select Metadata File, selecting the XML file. Then, click Next.
121121

122122
![](/img/ws-image12.png)
123123
4. Enter the SAML attributes to match what was entered in Okta and set the idle timeout value as well.

0 commit comments

Comments
 (0)