|
| 1 | +--- |
| 2 | +title: Okta SSO Integration For Green Lake And Aruba Central |
| 3 | +date: 2023-02-14T20:11:58.846Z |
| 4 | +externalLink: https://blog.wifig-guys.com |
| 5 | +author: "Will Smith - Consulting Systems Engineer (ACEX #34)" |
| 6 | +authorimage: /img/willsmith-sm.jpg |
| 7 | +thumbnailimage: /img/gl-sso.jpg |
| 8 | +disable: false |
| 9 | +--- |
| 10 | +Aruba Central has gone GREEN…GreenLake that is! If you’re reading this, then you’ve likely heard that Aruba Central is now integrated into the new HPE GreenLake Common Cloud Platform (GLCP). This allows IT admins to view and orchestrate critical network services such as Wired, Wireless and SD-Branch, through the same dashboard as their compute and storage infrastructure. |
| 11 | + |
| 12 | +If you are new to Aruba Central and are looking to enable SSO, this guide is for you. This will walk you through the process of configuring SSO for GreenLake and Aruba Central using Okta. |
| 13 | + |
| 14 | +### Before you Begin |
| 15 | + |
| 16 | +Please review the [GreenLake](https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us) User Guide to understand how the SAML framework works in the context of Common Cloud Services for the Aruba Central application. |
| 17 | + |
| 18 | +### Steps to Configure SSO/SAML Application in Okta |
| 19 | + |
| 20 | +To configure application metadata in Okta, complete the following steps: |
| 21 | + |
| 22 | +* Step 1: Create an Okta SAML application |
| 23 | +* Step 2: Configure Sign On settings |
| 24 | +* Step 3: Export the SAML 2.0 IdP metadata |
| 25 | +* Step 4: Configure the SAML connection in GreenLake |
| 26 | + |
| 27 | +**Step 1: Create an Okta SAML Application** |
| 28 | + |
| 29 | +1. Log in to the Okta administration console. |
| 30 | +2. Click **Applications > Create App Integration.** The Create a new app integration window opens. |
| 31 | +3. Select SAML 2.0 and click Next. |
| 32 | + |
| 33 | + |
| 34 | + |
| 35 | +Provide a name for the Aruba GreenLake SSO service (Okta Application) |
| 36 | + |
| 37 | + |
| 38 | + |
| 39 | +**Step 2: Configure Single Sign On settings** |
| 40 | + |
| 41 | +1. Enter the SAML information. |
| 42 | + |
| 43 | + Under General: |
| 44 | + |
| 45 | + ```` |
| 46 | + ```markdown |
| 47 | + Single Sign on URL: https://sso.common.cloud.hpe.com/sp/ACS.saml2 |
| 48 | + Audience URI (SP Entity ID): https://sso.common.cloud.hpe.com |
| 49 | + Name ID format EmailAddress |
| 50 | + Application username Email |
| 51 | + NameID = user.email |
| 52 | + gl_first_name = user.FirstName |
| 53 | + gl_last_name = user.LastName |
| 54 | + hpe_ccs_attribute = (See Below) |
| 55 | + ``` |
| 56 | + ```` |
| 57 | + |
| 58 | + See here for IdP attribute details: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us> |
| 59 | + |
| 60 | + One of the additional features added as part of the GreenLake CCS is Role Based Access Controls (RBAC) for Aruba Central and all other apps in CCS. A new SAML attribute has been added “hpe_ccs_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute. |
| 61 | + |
| 62 | + |
| 63 | + |
| 64 | + |
| 65 | + |
| 66 | + |
| 67 | + |
| 68 | + |
| 69 | + |
| 70 | +The **hpe_ccs_attribute** will always start with **version_1#**. First, we’ll configure the attributes for GreenLake CCS, then Central. First enter the PCID for the account, followed by the GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Then followed by the role name and **ALL_SCOPES**. Next will be the Aruba Central info. Start with the **app cid**, then the role name (IE Aruba Central Administrator) then **ALL_SCOPES**. |
| 71 | + |
| 72 | +Example: |
| 73 | + |
| 74 | +```` |
| 75 | + ```markdown |
| 76 | + version_1#5b0ec0e8c4f422eca232ba72799953ac:00000000-0000-0000-0000-000000000000: |
| 77 | + Account Administrator:ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092: |
| 78 | + Aruba Central Administrator:ALL_SCOPES |
| 79 | + ``` |
| 80 | +```` |
| 81 | + |
| 82 | +If you want to add additional GreenLake applications or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below. |
| 83 | + |
| 84 | + |
| 85 | + |
| 86 | +2. Complete the setup. |
| 87 | + |
| 88 | + |
| 89 | + |
| 90 | + |
| 91 | + |
| 92 | +Click Next and Select “Internal App” then Finish |
| 93 | + |
| 94 | +**Step 3:** **Export the SAML 2.0 IdP metadata** |
| 95 | + |
| 96 | +1. Click Next – Configure the Sign On settings |
| 97 | + |
| 98 | + Two options available: **View Setup Instructions** which steps through the SAML config or **Identity Provider metadata** will produce an XML that can be loaded into Aruba Central. |
| 99 | + |
| 100 | + Suggestion: Click **Identity Provider metadata** and save the XML data to a file. |
| 101 | + |
| 102 | +  |
| 103 | +2. Click Next |
| 104 | +3. Select Internal app and Click Finish |
| 105 | + |
| 106 | +**Step 4: Create SAML Authorization Profile in GreenLake Cloud Platform** |
| 107 | + |
| 108 | +1. Log into GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection. |
| 109 | + |
| 110 | + *Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for that domain.* |
| 111 | + |
| 112 | +  |
| 113 | +2. Type in the domain you want to enable SSO on: |
| 114 | + |
| 115 | +  |
| 116 | +3. Input the metadata from the above step |
| 117 | + |
| 118 | + While GreenLake does support manually entering this info, it’s recommended to simply upload the XML metadata that was downloaded in the previous step. Select Metadata File and select the XML. Then click Next. |
| 119 | + |
| 120 | +  |
| 121 | +4. Enter the SAML attributes to match what was entered in Okta and set the idle timeout value as well. |
| 122 | + |
| 123 | +  |
| 124 | +5. Then click Next. |
| 125 | +6. Create a recovery user in the event SSO fails, an admin will still be able to access GreenLake. |
| 126 | + |
| 127 | +  |
| 128 | + |
| 129 | + Congratulations SSO will now be enabled for GreenLake as well as the Aruba Central application. Log out and on the GrenLake home page, click Sign in with SSO. |
| 130 | + |
| 131 | +**Testing and Troubleshooting:** |
| 132 | + |
| 133 | +On the GreenLake Cloud Platform home page, Click Sign in with SSO. |
| 134 | + |
| 135 | + |
| 136 | + |
| 137 | + |
| 138 | + |
| 139 | +Enter the SSO credentials and you will be redirected to Okta to authenticate. Once you successfully authenticate, you will be redirected back to GreenLake. You can then click on the Aruba Central application and given access based on the configured role/permissions. |
| 140 | + |
| 141 | +**Additional Notes:** |
| 142 | + |
| 143 | +* There must be at least **one** verified user belonging to the **Domain** prior to configuration. |
| 144 | +* In order to configure SSO, you must be logged into GreenLake with a user from the domain. |
| 145 | +* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP. |
| 146 | +* SSO users can initiate a Single Sign On request by trying to log in to Aruba Central (SP-initiated login). |
| 147 | +* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us> |
| 148 | + |
| 149 | +**Okta MFA Example:** |
| 150 | + |
| 151 | +* Okta as well as many cloud identity providers support various MFA and other types of additional security policies. |
| 152 | +* Okta Verify (Okta native MFA app) example: |
| 153 | +* Okta Admin portal > Security > MFA > Factor Type – Okta Verify Enable |
| 154 | + |
| 155 | + |
| 156 | + |
| 157 | +1. Click Factor Enrollment and create an enrollment policy. |
| 158 | +2. Then select the user groups to apply this policy to. |
| 159 | +3. For MFA enable verify with push. |
| 160 | + |
| 161 | + |
| 162 | + |
| 163 | + |
0 commit comments