Salesforce
Prerequisites
- Salesforce Admin Portal Access.
- Accops HySecure Gateway with Public DNS name and valid SSL Certificate.
- Management Console of the HySecure Gateway with Security Officer level credentials.
- Shell Access to the Hysecure Gateway.
Configurations
Configure HySecure as IdP for SAML Application.
Note
This configuration is applicable for HySecure 5427 with the Hotfix 0006 and above.
Configuration Steps
-
Configure HySecure gateway as SAML identity provider.
- Login into the HySecure management console.
- Navigate to Settings > Services Config > SAML Identity Provider.
- Create a new SAML Identity Provider.
- Enter the following details:
- Domain Name: Select the configured HySecure domain that is used to authenticate the use from the authentication server.
- Entity ID: Enter the unique shared data between IdP and SP in the format https://hostname
- Single Sign-On Service Endpoint: Enter the IdP URL (HySecure) where SP will connect for SAML SSO.
- Single Logout Service Endpoint: Enter the IdP Logout URL where SP will connect for SAML Logout.
- NameId Format: Select the name identifier for the providers to communicate with each other regarding the user.
- Certificate Signing Options: Select the available SAML Signing Options (The default value is Sign SAML Assertion).
- Certificate signing Algorithm: Select the SAML assertion signing Algorithm (Default value is SHA 1).
- CA Certificate for Signing: Select the CA Certificate used to sign the SAML assertion (Use the certificate that is configured in SP if the HySecure certificate is used in SAML SP; we can leave this with the default value).
-
Publish the SAML SSO-based HTTPS application in the HySecure gateway.
- Select the SAML identity provider that is created.
- Select the preconfigured service provider.
- Verify the mapping attributes. Use the following for Office 365:
- Object GUID: NameID
- EmailID: IDPEmail
Important
SAML Certificates are stored at the location: /home/fes/fescommon/certs/saml_certs/{IDP_Name}
Set up HySecure Identity Provider (IdP) for Salesforce
-
Log in with a digital certificate to the Accops HySecure Gateway using a Security Officer's account.
-
Navigate to Apps > Apps and click Add to create a new application named Salesforce.
Important
Go to the Salesforce Portal via this link: https://login.salesforce.com/ and log in with the Global Admin and get information for the Salesforce Tenant.
- Type: HTTPS
- Name: Salesforce
- Description: Salesforce
- Application Server Address: accops-dev-ed.lightning.force.com
- Application Port: 443
- Protocol: TCP
- Web URL: https://accops-dev-ed.lightning.force.com/lightning/setup/SetupOneHome/home
- Use Reverse Proxy: No
- Hidden Application: No
- Hide Access Pop-up : No
- Enable App Tunnling : Yes
- Enable L3 VPN Tunneling : No
- Enable Single Sign-on : Yes
- Authentication Type : SAML Based
- Preconfigured Service Provider : Salesforce
- Select Identity Provider: Select the created SAML IdP
- Service Provider Login URL: https://accops-dev-ed.my.salesforce.com
- Service Provider Logout URL : https://accops-dev-ed.my.salesforce.com/services/auth/sp/saml2/logout
- Audience : https://saml.salesforce.com
- Issuer : https://sso.accops.cloud (HySecure Gateway Address)
- Service Provider Relay State: Enter Relay State if the application is configured with any relay state.
- Mapping Attributes: Add mapping approbated which will be sent in SAML response to the Application.
-
Add the Salesforce application to a New/Existing Application Group.
-
Create/Update an Application Access in the New/Existing Access Controls.
-
Verify the SAML SSO Certificate in the Accops HySecure Gateway. Ensure the following files are available in the Accops HySecure Gateway:
Certificate Path: /home/fes/fescommon/certs/
-rw-r--r-- 1 apache apache 1024 Aug 20 16:49 CA_Certificate_TestIDP.crt
-rw-r--r-- 1 apache apache 1024 Aug 20 16:49 CA_Decryption_Certificate_TestIDP.crt
-rw-r--r-- 1 apache apache 1674 Aug 20 16:49 Encrypt_Private_Key_TestIDP.pem
-rw-r--r-- 1 apache apache 1674 Aug 20 16:49 Private_Key_TestIDP.pem
Note
The TestIDP.cert is the name of the SAML Identity Provider that was created in the previous step.
-
Navigate to Settings > Services Config > SAML Identity Provider and download the certificate for the identity provider attached to the Google Suite Application.
For any HySecure gateway version 5427 with hotfix below 0006
- Ensure that the following files are available in the Accops HySecure gateway:
-rw-r--r-- 1 apache fes 2029 Mar 11 11:08 SAML_Signing_Certificate
-rw------- 1 apache fes 2498 Mar 11 11:09 SAML_Signing_Private_Key
If the above mentioned files are not present, make sure to create them using the command given below:
[root@sso1 ~]# cd /home/fes/fescommon/certs/
openssl x509 -inform PEM -in "sslcert.cer" -out SAML_Signing_Certificate
openssl rsa -in "sslcert.pem" -out SAML_Signing_Private_Key
Note
The command should be used after changing the Working Directory to /home/fes/fescommon/certs/.
-
Copy the content of the SAML SSO Certificate SAML_Signing_Certificate from the Accops Gateway.
Warning
Ensure that no new lines are added when copying the content in the SAML SSO Certificate
cat /home/fes/fescommon/certs/SAML_Signing_Certificate
-----BEGIN CERTIFICATE----- MIIFrDCCBJSgAwIBAgISBGJHkNGfVYEtgk7jonYIws6FMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTAxMjcxMDA1NDBaFw0yMTA0MjcxMDA1NDBaMBcxFTATBgNVBAMT DGFjY29wcy5jbG91ZDCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAJYh aZIcaKxjsQc0pheAN1qDTHUnfRIny3W6dShVEcdHBtVDqLo8BaFZ5elEhRZHt5u9 G1FTtN9r3YN8EyVqGG+VoHFZLs53nT2pKXe+OqtqKtW4sTOEWyVER3lFRRKgL1sx D8OZwjsDHtPubK9vcTwPE64+nfAcBGj+1tTETgXgsorZXmtybXiexwZxad4tFrFW XIm0aVB8FwRLiKhNZ5eK6c7+dKwQPkYuS6n60Psg9v/MBzxEE87nHbK5tDMmTotN xIn8uyi+l7ArPFvIWKIN8O/Qnrym7RH1L73jAuykhwEDXBkNysjpKkTuvthJCeGw oab9jcbVX5Vx0WCsuwTkvikJbp1NkI9pJcm97ST1d7NOkkIaI9Fq4TgucX2b0ZPr zCwaIRHXgII9eB9BO7idUi4u+23hB+jZYzGSVBz0lOPs90mW9jaFbPCt8CoX/Pm9 GAq0uFb/ceNrRKtk3gAX9J2/XHqk1rlnCwauT4qo7gfuqW4ygtwkYCSMHPPG+wID AQABo4ICVTDCAlEwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMB BggrBgEFBQKDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQ2EBlrVJBjq2oHXam7 Xzv5IVqm/jUfBgNVHSpEGDAWgBQULrMXt1hWy65QCUDmH6+dixTCxjBVBggrBgEF BQcBAQRJMEMwIQYIKwYBBQUHMAGGFWh0dHA6Ly9yMy5vLmxlbmNyLm9yZzAiBggr BgEFBQcwAoAWaHR0cDovL3IzLmkubGVuY3Iub3JnLzAnBgNVHREEIDAegg4qLmFj Y29wcy5jbGR1ZIIMYWNjb3BzLmNsb3VkMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcG CysGAQQBgtNTAQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5 cHQub3JnMIOBAgYKKwYBBAHWeQIEAgSB8wSB8ADuAHUAlCC8Ho7VjWyIcx+CiyIs DdHaTV5sT5W9YdtOL1hNosIAAAF3Q4U54wAABAMARjBEAiBXSdXt8+QVBFC4sy3j FpJYds7BIMYysomjQXY4EM+AiwIgUOtBJPV6s9mT3VdQOz4+R3CYD08Zu72+bahC oyT2/+gAdQO2XJQv0XcwIhRUGAgwlFaO400TGTO/3wwvIAvMTvFk4wAAAXdDhTof AAAEAwBGMEUCIEC8Gb+EDzePNEuEE5pOT0jnV2M41Jj94DTwKEoqjoRxAiAZZUX5 tG4mCC+G4pCRIHhrbxdPoBXj7UsWPzkHiHnZxjANBgkqhkiG9w0BAQsFAAOCAQEA BV6d943HCsAesV1SiT7+hsBZQsDy7+KcPiSkfq50qMFuD1S2m1PE/Y0tNULT2DxB fEPGsJrVubND+wJrufAljenEZZzivdrxjAMBBuybqzFlNQoMmIJa7V7xnE9pCSPb k0UGYKSgHxSsqKxzLiRuneicVyMwyD/LxdF/QbxPfVWnt+mi1rduQk9yhoT6wubq T99qVOIzPnEkM1MO5qm0mD/xirlO5bbVDqJClGR0ifnrHN5ueWTgbMT1ruCyFcx5 zDPB+7NWzyELdQ82I9UNCZ+/8GNu7bQX6p/w0BzDLwv3i3B5So8QetouPBF4Zpu1 Ejb8AQeQjIMJCWtYHdO4Fg== -----END CERTIFICATE-----
Set up HySecure in Salesforce (Service Provider)
-
Go to Salesforce with Administrator level access via this link: https://login.salesforce.com Alternatively, use link: https://domain.my.salesforce.com
-
After logging in to the Salesforce Portal, go to Settings.
-
Navigate to Settings > Identity > Single Sign-On Settings.
-
Click New.
-
Fill in the required details:
- Name: Accops_IDP_Server
- API Name: Accops_IDP_Server
- SAML Version: 2.0
- Issuer: https://sso.accops.cloud Replace sso.accops.cloud with your Accops IDP Server
- Entity ID: https://saml.salesforce.com
- Identity Provider Certificate: Import SAML SSO Certificate from Accops HySecure Gateway (As per the prerequisites).
- Request Signature Method: RSA-SHA256
- Assertion Decryption Certificate: Assertion not encrypted
- SAML Identity Type: Assertion contains the User's Salesforce username
- SAML Identity Location: Identity is in the NameIdentifier element of the Subject statement
- Service Provider Initiated Request Binding: HTTP POST
- Identity Provider URL: https://sso.accops.cloud/saml-sso/salesforce Replace sso.accops.cloud with your Accops IDP Server
- Custom Logout URL: https://sso.accops.cloud/saml-slo/salesforce Replace sso.accops.cloud with your Accops IDP Server
-
Verify the IdP settings and endpoint details for Salesforce.
*Your Organization
Login URL - https://accops-dev-ed.my.salesforce.com
Logout URL - https://accops-dev-ed.my.salesforce.com/services/auth/sp/saml2/logout
Click Download Metadata to configure the Identity Provider Server (if it is not already configured).
Sign in to your Salesforce
Using IdP initiated login
-
Go to the Accops Workspace Portal.
Enter the sAMAccountName of the user.
For Example:
Username: xyz.abc Password: xxxxxx Domain: accops.cloud
-
Enter the login credentials. Choose the domain and click Sign In.
-
Verify using Multi-Factor Authentication.
-
Upon successful Authentication and Authorization, the user will be redirected to the Accops Workspace Portal.
-
Click the Salesforce icon to launch the Single Sign On access to the Salesforce Portal.
Using SP initiated login
- Go to Salesforce via this link: https://accops-dev-ed.my.salesforce.com .
-
Login using Accops SSO .
-
The Authentication request will be redirected to the organization's Sign In page (Accops IdP Login Portal). Enter the Authentication details. Click Sign-In.
Enter the sAMAccountName of the user.
For Example:
Username: xyz.abc Password: xxxxxx
-
On the next screen, the Accops IdP Server will prompt if more Authentication is required. Choose Send Push to Mobile/Desktop and Authorize the desktop to push to log in.
-
Upon successful authorization you can access the Salesforce Portal.