Skip to content

Commit 90f8b86

Browse files
committed
Update Blog “okta-sso-integration-for-green-lake-and-aruba-central”
1 parent 3334f8f commit 90f8b86

20 files changed

+19
-21
lines changed

content/blog/okta-sso-integration-for-green-lake-and-aruba-central.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,11 @@ To configure application metadata in Okta, complete the following steps:
3030
2. Click **Applications > Create App Integration.** The Create a new app integration window opens.
3131
3. Select SAML 2.0 and click Next.
3232

33-
![](/img/image0.png)
33+
![](/img/ws-image0.png)
3434

3535
Provide a name for the Aruba GreenLake SSO service (Okta Application)
3636

37-
![](/img/image1.png)
37+
![](/img/ws-image1.png)
3838

3939
**Step 2: Configure Single Sign On settings**
4040

@@ -59,13 +59,13 @@ Provide a name for the Aruba GreenLake SSO service (Okta Application)
5959

6060
One of the additional features added as part of the GreenLake CCS is Role Based Access Controls (RBAC) for Aruba Central and all other apps in CCS. A new SAML attribute has been added “hpe_ccs_attribute” which tells GreenLake and Central the exact role/permissions for each user. The following describes how to format the attribute.
6161

62-
![](/img/image2.png)
62+
![](/img/ws-image2.png)
6363

64-
![](/img/image3.png)
64+
![](/img/ws-image3.png)
6565

66-
![](/img/image4.png)
66+
![](/img/ws-image4.png)
6767

68-
![](/img/image5.png)
68+
![](/img/ws-image5.png)
6969

7070
The **hpe_ccs_attribute** will always start with **version_1#**. First, we’ll configure the attributes for GreenLake CCS, then Central. First enter the PCID for the account, followed by the GreenLake application ID. This will always be **00000000-0000-0000-0000-000000000000**. Then followed by the role name and **ALL_SCOPES**. Next will be the Aruba Central info. Start with the **app cid**, then the role name (IE Aruba Central Administrator) then **ALL_SCOPES**.
7171

@@ -81,13 +81,11 @@ Example: 
8181

8282
If you want to add additional GreenLake applications or if you have multiple Aruba Central accounts, you can add them as well. Just follow the same syntax as before. Once you have the attribute defined, enter it into the SAML attribute statement in Okta as shown below.
8383

84-
![](/img/image6.png)
84+
![](/img/ws-image6.png)
8585

8686
2. Complete the setup.
8787

88-
![](/img/image7.png)
89-
90-
![](/img/image8.png)
88+
![](/img/ws-image7.png)
9189

9290
Click Next and Select “Internal App” then Finish
9391

@@ -99,7 +97,7 @@ Click Next and Select “Internal App” then Finish
9997

10098
Suggestion: Click **Identity Provider metadata** and save the XML data to a file.
10199

102-
![](/img/image9.png)
100+
![](/img/ws-image9.png)
103101
2. Click Next
104102
3. Select Internal app and Click Finish
105103

@@ -109,32 +107,32 @@ Click Next and Select “Internal App” then Finish
109107

110108
*Before you can add a new SAML configuration, you must have at least one user account with that domain already enabled in GreenLake. Also, you must be logged into GreenLake with an account from that domain in order to enable SSO for that domain.*
111109

112-
![](/img/image10.png)
110+
![](/img/ws-image10.png)
113111
2. Type in the domain you want to enable SSO on:
114112

115-
![](/img/image11.png)
113+
![](/img/ws-image11.png)
116114
3. Input the metadata from the above step
117115

118116
While GreenLake does support manually entering this info, it’s recommended to simply upload the XML metadata that was downloaded in the previous step. Select Metadata File and select the XML. Then click Next.
119117

120-
![](/img/image12.png)
118+
![](/img/ws-image12.png)
121119
4. Enter the SAML attributes to match what was entered in Okta and set the idle timeout value as well.
122120

123-
![](/img/image13.png)
121+
![](/img/ws-image13.png)
124122
5. Then click Next.
125123
6. Create a recovery user in the event SSO fails, an admin will still be able to access GreenLake.
126124

127-
![](/img/image14.png)
125+
![](/img/ws-image14.png)
128126

129127
Congratulations SSO will now be enabled for GreenLake as well as the Aruba Central application. Log out and on the GrenLake home page, click Sign in with SSO.
130128

131129
**Testing and Troubleshooting:**
132130

133131
On the GreenLake Cloud Platform home page, Click Sign in with SSO.
134132

135-
![](/img/image15.png)
133+
![](/img/ws-image15.png)
136134

137-
![](/img/image16.png)
135+
![](/img/ws-image16.png)
138136

139137
Enter the SSO credentials and you will be redirected to Okta to authenticate. Once you successfully authenticate, you will be redirected back to GreenLake. You can then click on the Aruba Central application and given access based on the configured role/permissions.
140138

@@ -152,12 +150,12 @@ Enter the SSO credentials and you will be redirected to Okta to authenticate. On
152150
* Okta Verify (Okta native MFA app) example:
153151
* Okta Admin portal > Security > MFA > Factor Type – Okta Verify Enable
154152

155-
![](/img/image17.png)
153+
![](/img/ws-image17.png)
156154

157155
1. Click Factor Enrollment and create an enrollment policy.
158156
2. Then select the user groups to apply this policy to.
159157
3. For MFA enable verify with push.
160158

161-
![](/img/image18.png)
159+
![](/img/ws-image18.png)
162160

163-
![](/img/image19.jpeg)
161+
![](/img/ws-image19.jpeg)

static/img/ws-image0.png

121 KB
Loading

static/img/ws-image1.png

111 KB
Loading

static/img/ws-image10.png

76.6 KB
Loading

static/img/ws-image11.png

78.9 KB
Loading

static/img/ws-image12.png

72.1 KB
Loading

static/img/ws-image13.png

160 KB
Loading

static/img/ws-image14.png

167 KB
Loading

static/img/ws-image15.png

36.5 KB
Loading

static/img/ws-image16.png

44.7 KB
Loading

0 commit comments

Comments
 (0)