Salesforce: Configure SSO to Simpplr using Okta

Note:

This article provides steps on how to initially set up Okta's SSO solution with Simpplr. For information on how to sync attributes from Okta to Simpplr, click here.

 

Table of Contents

Add the Salesforce Application in Okta

Enable and Deploy My Domain on your Salesforce Org

Configure SAML 2.0 in Salesforce

Configure Okta

Control User Access

 

Add the Salesforce Application in Okta

Back to top

  1. Log in to Okta with Admin credentials and click on the Admin button in the top left to open the admin console panel.
    Screen_Shot_2021-09-14_at_1.07.13_PM.png
  2. Navigate to Applications > Applications. Then click Add Application.
    Screen_Shot_2021-09-14_at_1.15.54_PM.png 
  3. Search for Salesforce.com and select it from the list of results. Click Add.
  4. Give the Application name (not compulsory) and click Next.
  5. In the Custom Domain field, add your company domain. For example, if your url is https://simpplr.my.salesforce.com, input simpplr to the Custom Domain field.
  6. From the next tab Sign-on options, select SAML 2.0 and click Identity Provider Metadata to download the IDP file.
    Screen_Shot_2021-09-14_at_1.19.01_PM.png
  7. In Sign-on options, enter the Login URL. This is you domain URL in Salesforce. It should look similar to https://mydomain.my.salesforce.com (replace mydomain with your custom domain name).
  8. Select the Application username format as per your requirement or leave this as Okta Username. You can also select custom with expression. for example, user.email+'.simpplr'. Once finished, click Done.

Enable and Deploy My Domain on your Salesforce Org

Back to top

The Salesforce My Domain feature allows you to select a custom domain name for your application. A My Domain URL looks like https://customer.my.salesforce.com.

  1. In your Salesforce Org, click Setup. Then in the Quick Find box, type My Domain. Choose My Domain from the results.
  2. Type in your requested domain name and click Check Availability. If your name is already taken, choose a different one.
  3. Click Save.

Configure SAML 2.0 in Salesforce

Back to top

  1. Log in to Salesforce with the same administrator username and password used for User.
    Management settings in Okta.
  2. Navigate to Setup and type Single sign on into the Quick Find Box. then choose Single Sign-On Settings.
    sso_enable_salesforce.gif
  3. Click Edit and check the SAML Enabled box, then click Save.
  4. In the list at the bottom of the page, select New to add a new SAML Single Sign-On configuration.
  5. A new page will open. Choose New from Metadata File and upload the file you created in Okta. then click Create.
    Screen_Shot_2021-09-14_at_1.34.56_PM.png
  6. Once complete, click Save. Make a note of the Salesforce Login URL that will appear after you save.

Configure Okta

Back to top

  1. Create an administrator account in Salesforce. You will use this account’s username and password to configure the Salesforce app in Okta. When you create an administrator account, Salesforce will provide you with a token.

    Note:

    Every time you reset this account’s password, Salesforce will provide you with a new token, and you need to edit the Salesforce app’s Provisioning settings in Okta using the new password/token as described below.
  2. Click Configure API Integration.
    Screen_Shot_2021-09-14_at_1.40.49_PM.png
  3. Check the Enable API Integration box and enter the username, password and token associated with your Salesforce Admin account.

    Note:

    Simply append the token Salesforce provided to you to your password, no spaces or other characters.

    Screen_Shot_2021-09-14_at_1.42.19_PM.png
  4. Once input, click Test API Credentials. If successful, a verification message appears at the top of the screen. Select To App in the left panel, then Provisioning Features you want to enable.

    Note:

    As part of provisioning each new portal user, Okta creates a new contact in Salesforce associated with the account you specify in the AccountIDfield. This new contact contains the user's name and email address. This contact is necessary because Portal users in Salesforce must be associated with a contact.

    Screen_Shot_2021-09-14_at_1.44.17_PM.png
  5. Select parameters such as Create user, Update User Attributes, Deactivate Users, and Sync Password.

  6. In Sync Password, select password type such as Sync Okta Password.

    Note:

    Okta recommends managing users completely from Okta, which is why we're selecting all the parameters above.
  7. Select To Okta in the left panel change Okta username format to Email address or Okta Username as per your configuration.
    Screen_Shot_2021-09-14_at_1.48.07_PM.png
  8. Click Save. You can now assign people to the app (if needed) and finish the application setup.

Control User Access

Back to top

Note

If you don't populate timezones for your users in Okta, the timezone will be set to Pacific time by default within Salesforce.

Create two groups in Okta or Active Directory (if you are syncing groups from Active Directory). The group name should be similar to Simpplr_User and Simpplr_Admin. You'll use these groups to control user access on Simpplr.

  1. Log in to the Okta Admin page.
  2. Navigate to Application > Application and search for your Salesforce org. In the results, click the Application name. 
  3. Click on Assignments, then Assign on the left side of the screen. Choose Assign to Group.
    Screen_Shot_2021-09-14_at_1.59.25_PM.png
  4. Select the group(s) to which the application needs to be assigned.
  5. On assigning app to the group, scroll down and then assign the Profile, Role (Optional) and Permission sets from the same window.
  6. For Simpplr_Admin select profile as System Administrator and for Simpplr_User select profile as Simpplr User. In both cases, it is mandatory to select the permission sets, i.e. Simpplr_User.
    Screen_Shot_2021-09-14_at_2.01.42_PM.png
  7. Click Save.
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.

Articles in this section

See more