You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
41
41
42
42

43
43
44
-
**Step 2: Configure Single Sign On settings**
44
+
**Step 2: How to configure Single Sign On settings**
45
45
46
46
1. Enter the SAML information.
47
47
@@ -65,7 +65,7 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
65
65
66
66
See here for IdP attribute details: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
67
67
68
-
One of the additional features added as part of the GreenLake platform is Role Based Access Controls (RBAC) for Aruba Central and all other apps in GLCP. A new SAML attribute has been added “hpe_ccs_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
68
+
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe\_ccs\_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
69
69
70
70

71
71
@@ -75,15 +75,15 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
75
75
76
76

77
77
78
-
The **hpe\_ccs\_attribute**will always start with **version_1#**. First, we’ll configure the attributes for GreenLake CCS, then Central. First enter the PCID for the account, followed by the GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Then followed by the role name and **ALL_SCOPES**. Next will be the Aruba Central info. Start with the **app cid**, then the role name (IE Aruba Central Administrator) then **ALL_SCOPES**.
78
+
The **hpe\_ccs\_attribute** always starts with version_1#. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL_SCOPES**.
If you want to add additional GreenLake applications or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below.
86
+
If you want to add additional HPE GreenLake applications, or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below.
87
87
88
88

89
89
@@ -97,27 +97,27 @@ Click Next and Select “Internal App” then Finish
97
97
98
98
1. Click Next – Configure the Sign On settings
99
99
100
-
Two options available: **View Setup Instructions** which steps through the SAML config or**Identity Provider metadata**will produce an XML that can be loaded into Aruba Central.
100
+
You will find two options are available: **View Setup Instructions** which steps you through the SAML configuration and**Identity Provider metadata**, which will produce an XML file that can be loaded into Aruba Central.
101
101
102
102
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
103
103
104
104

105
105
2. Click Next
106
-
3. Select Internal app and Click Finish
106
+
3. Select Internal app, and Click Finish
107
107
108
-
**Step 4: Create SAML Authorization Profile in GreenLake Cloud Platform**
1. Log into GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
110
+
1. Log into HPE GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
111
111
112
-
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for that domain.*
112
+
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for it.*
113
113
114
114

115
115
2. Type in the domain you want to enable SSO on:
116
116
117
117

118
-
3. Input the metadata from the above step
118
+
3. Input the metadata from the step above.
119
119
120
-
While GreenLake does support manually entering this info, it’s recommended to simply upload the XML metadata that was downloaded in the previous step. Select Metadata File and select the XML. Then click Next.
120
+
While HPE GreenLake does support entering this information manually, it's recommended that you simply upload the XML metadata that was downloaded in the previous step. To do so, Select Metadata File, selecting the XML file. Then, click Next.
121
121
122
122

123
123
4. Enter the SAML attributes to match what was entered in Okta and set the idle timeout value as well.
0 commit comments