Thursday 27 February 2014

Implementation of Single Sign On using SAML in Salesforce - Part 3


IdentityFlow.png














After knowing how does the SSO work in Part 1 and Part 2, let's gear up to know how we can set up Salesforce as an Identity Provider and define Service Provider with Salesforce. 

Enabling Salesforce as an Identity provider

  1. Set up a My domain
  2. From Setup, click Security Controls | Identity Provider, and then click Enable Identity Provider
  3. Select the certificate: If you haven't created a self-signed certificate, one is automatically generated for you and assigned as the certificate for your identity provider.

Note:
  1. Salesforce is automatically enabled as an identity provider for domains created in Winter ‘14 or later.
  2.  After you enable Salesforce as an identity provider, you can define service providers.
thinking-emoticon-15563809.jpg


Defining Service Providers as SAML-Enabled Connected Apps

Prerequisites

  1. Enabling Salesforce as an Identity Provider
  2. Give your service provider information about your configuration of Salesforce as an identity provider.
  3. From Setup, click Security Controls | Identity Provider, then click Download Certificate or Download Metadata.
  4. Get the following information from your service provider

    • Assertion consumer service (ACS) URL: The ACS URL comes from the SAML service provider.
    • Entity ID: This value comes from the service provider.
    • Subject type: specifies if the subject for the SAML response from Salesforce (as an identity provider) is a Salesforce user name or a federation ID
    • Issuer: your organization’s My Domain
    • Start URL: Directs users to a specific location when they run the application

To authorize users for this SAML application

  1. From Setup click Manage Apps | Connected Apps and then click the name of the application.
  2. Select the profiles and/or permission sets that can access the application.
    

No comments:

Post a Comment

Thank you for visiting. Your comments are highly appreciated.