Skip to content

Commit 7e8bc57

Browse files
authored
Merge pull request #1768 from hpe-dev-incubator/cms/blog/okta-sso-integration-for-green-lake-and-aruba-central
Update Blog “okta-sso-integration-for-green-lake-and-aruba-central”
2 parents a9dadcd + 070308b commit 7e8bc57

File tree

1 file changed

+30
-16
lines changed

1 file changed

+30
-16
lines changed

content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md

Lines changed: 30 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ To configure application metadata in Okta, complete the following steps:
2727
* Step 1: Create an Okta SAML application
2828
* Step 2: Configure Sign On settings
2929
* Step 3: Export the SAML 2.0 IdP metadata
30-
* Step 4: Configure the SAML connection in GreenLake
30+
* Step 4: Configure the SAML connection in HPE GreenLake
3131

3232
**Step 1: Create an Okta SAML application**
3333

3434
1. Log in to the Okta administration console.
3535
2. Click **Applications > Create new app integration.** The Create a new app integration window opens.
36-
3. Select SAML 2.0 and click Next.
36+
3. Select SAML 2.0 and click **Next**.
3737

3838
![](/img/ws-image0.png)
3939

@@ -65,7 +65,7 @@ Provide a name for the Aruba GreenLake SSO service (Okta application)
6565

6666
See here for IdP attribute details: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
6767

68-
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe\_ccs\_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
68+
As part of the HPE GreenLake cloud platform integration, one of the additional features that was added is the Role Based Access Controls for Aruba Central and all other apps on the platform. A new SAML attribute has been added “hpe\_ccs\_attribute” which tells HPE GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
6969

7070
![](/img/ws-image2.png)
7171

@@ -91,7 +91,7 @@ If you want to add additional HPE GreenLake applications, or if you have multipl
9191

9292
![](/img/ws-image7.png)
9393

94-
Click Next and Select “Internal App” then Finish
94+
Click Next and Select “Internal App”, then Finish.
9595

9696
**Step 3:** **Export the SAML 2.0 IdP metadata**
9797

@@ -102,37 +102,46 @@ Click Next and Select “Internal App” then Finish
102102
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
103103

104104
![](/img/ws-image9.png)
105-
2. Click Next
106-
3. Select Internal app, and Click Finish
105+
106+
2. Click Next.
107+
108+
3. Select Internal app, and Click Finish.
109+
107110

108111
**Step 4: Create SAML Authorization Profile in HPE GreenLake Cloud Platform**
109112

110113
1. Log into HPE GreenLake and click Menu > Manage > Authentication and Click Set Up SAML Connection.
111114

112-
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for it.*
115+
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in HPE GreenLake. Also, you must be logged into HPE GreenLake with an account from that domain in order to enable SSO for it.*
113116

114117
![](/img/ws-image10.png)
118+
115119
2. Type in the domain you want to enable SSO on:
116120

117121
![](/img/ws-image11.png)
122+
118123
3. Input the metadata from the step above.
119124

120125
While HPE GreenLake does support entering this information manually, it's recommended that you simply upload the XML metadata that was downloaded in the previous step. To do so, Select Metadata File, selecting the XML file. Then, click Next.
121126

122127
![](/img/ws-image12.png)
128+
123129
4. Enter the SAML attributes to match what was entered in Okta. Set the idle timeout value as well.
124130

125131
![](/img/ws-image13.png)
126-
5. Then click Next.
127-
6. Create a recover user so that, in the event SSO fails, an admin will still be able to access the HPE GreenLake portal.
132+
133+
5. Then click Next.
134+
135+
6. Create a recover user so that, in the event SSO fails, an admin will still be able to access the HPE GreenLake portal.
136+
128137

129138
![](/img/ws-image14.png)
130139

131-
Congratulations! SSO will now be enabled for HPE GreenLake as well as the Aruba Central application. Log out and on the HPE GreenLake home page, click Sign in with SSO.
140+
Congratulations! SSO will now be enabled for HPE GreenLake as well as the Aruba Central application. Log out and on the HPE GreenLake home page, click **Sign in with SSO**.
132141

133142
**Testing and troubleshooting:**
134143

135-
On the HPE GreenLake Cloud Platform home page, click Sign In with SSO.
144+
On the HPE GreenLake Cloud Platform home page, click **Sign In with SSO**.
136145

137146
![](/img/ws-image15.png)
138147

@@ -142,9 +151,14 @@ Enter the SSO credentials. You will be redirected to Okta to authenticate. Once
142151

143152
**Additional notes:**
144153

145-
* There must be at least **one** verified user belonging to the **Domain** prior to configuration.
146-
* In order to configure SSO, you must be logged into HPE GreenLake with a user from the domain.
147-
* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP.
148-
* SSO users can initiate a Single Sign On request by trying to log into Aruba Central (SP-initiated login).
149-
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
154+
* There must be at least **one** verified user belonging to the **Domain** prior to configuration.
155+
156+
* In order to configure SSO, you must be logged into HPE GreenLake with a user from the domain.
157+
158+
* SSO user access is determined by the “role_name” attribute included in the SAML hpe_ccs_attribute provided by the IdP.
159+
160+
* SSO users can initiate a Single Sign On request by trying to log into Aruba Central (SP-initiated login).
161+
162+
* For more troubleshooting: <https://support.hpe.com/hpesc/public/docDisplay?docId=a00120892en_us>
163+
150164

0 commit comments

Comments
 (0)