You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md
+30-16Lines changed: 30 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,13 +27,13 @@ To configure application metadata in Okta, complete the following steps:
27
27
* Step 1: Create an Okta SAML application
28
28
* Step 2: Configure Sign On settings
29
29
* Step 3: Export the SAML 2.0 IdP metadata
30
-
* Step 4: Configure the SAML connection in GreenLake
30
+
* Step 4: Configure the SAML connection in HPE GreenLake
31
31
32
32
**Step 1: Create an Okta SAML application**
33
33
34
34
1. Log in to the Okta administration console.
35
35
2. Click **Applications > Create new app integration.** The Create a new app integration window opens.
36
-
3. Select SAML 2.0 and click Next.
36
+
3. Select SAML 2.0 and click **Next**.
37
37
38
38

39
39
@@ -65,7 +65,7 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
65
65
66
66
See here for IdP attribute details: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
67
67
68
-
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe\_ccs\_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
68
+
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe\_ccs\_attribute” which tells HPE GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
69
69
70
70

71
71
@@ -91,7 +91,7 @@ If you want to add additional HPE GreenLake applications, or if you have multipl
91
91
92
92

93
93
94
-
Click Next and Select “Internal App” then Finish
94
+
Click Next and Select “Internal App”, then Finish.
95
95
96
96
**Step 3:****Export the SAML 2.0 IdP metadata**
97
97
@@ -102,37 +102,46 @@ Click Next and Select “Internal App” then Finish
102
102
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
1. Log into HPE GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
111
114
112
-
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for it.*
115
+
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into HPE GreenLake with an account from that domain in order to enable SSO for it.*
113
116
114
117

118
+
115
119
2. Type in the domain you want to enable SSO on:
116
120
117
121

122
+
118
123
3. Input the metadata from the step above.
119
124
120
125
While HPE GreenLake does support entering this information manually, it's recommended that you simply upload the XML metadata that was downloaded in the previous step. To do so, Select Metadata File, selecting the XML file. Then, click Next.
121
126
122
127

128
+
123
129
4. Enter the SAML attributes to match what was entered in Okta. Set the idle timeout value as well.
124
130
125
131

126
-
5. Then click Next.
127
-
6. Create a recover user so that, in the event SSO fails, an admin will still be able to access the HPE GreenLake portal.
132
+
133
+
5. Then click Next.
134
+
135
+
6. Create a recover user so that, in the event SSO fails, an admin will still be able to access the HPE GreenLake portal.
136
+
128
137
129
138

130
139
131
-
Congratulations! SSO will now be enabled for HPE GreenLake as well as the Aruba Central application. Log out and on the HPE GreenLake home page, click Sign in with SSO.
140
+
Congratulations! SSO will now be enabled for HPE GreenLake as well as the Aruba Central application. Log out and on the HPE GreenLake home page, click **Sign in with SSO**.
132
141
133
142
**Testing and troubleshooting:**
134
143
135
-
On the HPE GreenLake Cloud Platform home page, click Sign In with SSO.
144
+
On the HPE GreenLake Cloud Platform home page, click **Sign In with SSO**.
136
145
137
146

138
147
@@ -142,9 +151,14 @@ Enter the SSO credentials. You will be redirected to Okta to authenticate. Once
142
151
143
152
**Additional notes:**
144
153
145
-
* There must be at least **one** verified user belonging to the **Domain** prior to configuration.
146
-
* In order to configure SSO, you must be logged into HPE GreenLake with a user from the domain.
147
-
* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP.
148
-
* SSO users can initiate a Single Sign On request by trying to log into Aruba Central (SP-initiated login).
149
-
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
154
+
* There must be at least **one** verified user belonging to the **Domain** prior to configuration.
155
+
156
+
* In order to configure SSO, you must be logged into HPE GreenLake with a user from the domain.
157
+
158
+
* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP.
159
+
160
+
* SSO users can initiate a Single Sign On request by trying to log into Aruba Central (SP-initiated login).
161
+
162
+
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
0 commit comments