Skip to content

Commit 5ab5f56

Browse files
committed
Update Blog “okta-sso-integration-for-green-lake-and-aruba-central”
1 parent acc357a commit 5ab5f56

File tree

2 files changed

+7
-22
lines changed

2 files changed

+7
-22
lines changed

content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md

Lines changed: 7 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -59,25 +59,25 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
5959

6060
**NameID = user.email**
6161

62-
**gl\_first\_name = user.FirstName**
62+
**gl_first_name = user.FirstName**
6363

64-
**gl\_last\_name = user.LastName**
64+
**gl_last_name = user.LastName**
6565

66-
**hpe\_ccs\_attribute = (See Below)**
66+
**hpe_ccs_attribute = (See Below)**
6767

6868
See here for IdP attribute details: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
6969

70-
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe\_ccs\_attribute” which tells HPE GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
70+
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe_ccs_attribute” which tells HPE GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
7171

7272
![](/img/ws-image2.png)
7373

7474
![](/img/ws-image3.png)
7575

76-
![](/img/ws-image4.png)
76+
![](/img/ws-image17.png)
7777

7878
![](/img/ws-image5.png)
7979

80-
The **hpe\_ccs\_attribute** always starts with version_1#. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL_SCOPES**.
80+
The **hpe_ccs_attribute** always starts with version_1#. You must first configure the attributes for HPE GreenLake CSS, and then Central. To do so, enter the PCID for the account, followed by the HPE GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Following this, enter the role name and **ALL_SCOPES**. Next, enter in the Aruba Central information. Start with the **app cid**, followed by the role name (i.e. Aruba Central Administrator), and then **ALL_SCOPES**.
8181

8282
Example:
8383

@@ -104,39 +104,30 @@ Click Next and Select “Internal App”, then Finish.
104104
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
105105

106106
![](/img/ws-image9.png)
107-
108107
2. Click Next.
109-
110108
3. Select Internal app, and Click Finish.
111109

112-
113110
**Step 4: Create SAML Authorization Profile in HPE GreenLake Cloud Platform**
114111

115112
1. Log into HPE GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
116113

117114
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into HPE GreenLake with an account from that domain in order to enable SSO for it.*
118115

119116
![](/img/ws-image10.png)
120-
121117
2. Type in the domain you want to enable SSO on:
122118

123119
![](/img/ws-image11.png)
124-
125120
3. Input the metadata from the step above.
126121

127122
While HPE GreenLake does support entering this information manually, it's recommended that you simply upload the XML metadata that was downloaded in the previous step. To do so, Select Metadata File, selecting the XML file. Then, click Next.
128123

129124
![](/img/ws-image12.png)
130-
131125
4. Enter the SAML attributes to match what was entered in Okta. Set the idle timeout value as well.
132126

133127
![](/img/ws-image13.png)
134-
135128
5. Then click Next.
136-
137129
6. Create a recover user so that, in the event SSO fails, an admin will still be able to access the HPE GreenLake portal.
138130

139-
140131
![](/img/ws-image14.png)
141132

142133
Congratulations! SSO will now be enabled for HPE GreenLake as well as the Aruba Central application. Log out and on the HPE GreenLake home page, click **Sign in with SSO**.
@@ -154,13 +145,7 @@ Enter the SSO credentials. You will be redirected to Okta to authenticate. Once
154145
**Additional notes:**
155146

156147
* There must be at least **one** verified user belonging to the **Domain** prior to configuration.
157-
158148
* In order to configure SSO, you must be logged into HPE GreenLake with a user from the domain.
159-
160149
* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP.
161-
162150
* SSO users can initiate a Single Sign On request by trying to log into Aruba Central (SP-initiated login).
163-
164-
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
165-
166-
151+
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>

static/img/ws-image17.png

163 KB
Loading

0 commit comments

Comments
 (0)