Configure Codebot SSO in Successfactors Provisioning
Access to Successfactors provisioning, click on SSO settings.
Select For SAML based SSO:
SAML Asserting Parties(IdP): Add a SAML Asserting Party
Fill the following fields:
SAML Asserting Party Name: Codebot
SAML Issuer: https://idp.sfcodebot.com/saml/metadata.xml
Require Mandatory Signature: Both
Enable SAML Flag: Enabled
Login Request Signature(SF Generated/SP/RP): No
SAML Profile : Browser/Post Profile Enforce Certificate Valid Period : Yes
SAML Verifying Certificate:
-----BEGIN CERTIFICATE-----
MIICbjCCAdegAwIBAgIBADANBgkqhkiG9w0BAQ0FADBUMQswCQYDVQQGEwJ1czEOMAwGA1UECA wFVGV4YXMxETAPBgNVBAoMCE5ldDJBcHBzMRAwDgYDVQQDDAdDb2RlQm90MRAwDgYDVQQLD AdDb2RlQm90MB4XDTIzMDEyNjEwMTYxNFoXDTI2MDEyNTEwMTYxNFowVDELMAkGA1UEBhMCdX MxDjAMBgNVBAgMBVRleGFzMREwDwYDVQQKDAhOZXQyQXBwczEQMA4GA1UEAwwHQ29kZUJvd DEQMA4GA1UECwwHQ29kZUJvdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA45D21YzFO6
QPR6MQ19NTcaYcidGPCwZwHvlc6tHB8cwV6IBA8j5pwGgmqAJbIePjd86tUWyEy2VQXMgS4yEno32X7 ik14YJkZExIOp/mE5u56kHYzz2xavRWW+zvgFGS1jG6F7UAkfA/7dr2XJKPER2zQdLLr4HDq9kU98fryb8 CAwEAAaNQME4wHQYDVR0OBBYEFJbwm8ppaRUkP1gTFMxPhvhk6CgEMB8GA1UdIwQYMBaAFJb
wm8ppaRUkP1gTFMxPhvhk6CgEMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEADZPT fylixJcDZJNZc6wWFVkHBU1p21tQQUDP6htL7AYZ91IhnG2JUm4boNT+gM+X/SlGb4QL8+L5axJqbVMX tbljGUpyrYzlVF85mKvrwVan/ZcF/6Nh19BYa3+5Fh6+1ERfUWKBJ42CPJdgya6VJ8V/iZyAfUI2M1oc+iuCc yc=
-----END CERTIFICATE-----
Please enter the redirect URL when logout: https://idp.sfcodebot.com/saml/logout
Please enter the redirect URL when session timeout: https://idp.sfcodebot.com/saml/logout
Please enter the URL for Invalid Login URL redirect: https://idp.sfcodebot.com/saml/logout
**SAML v2 : SP-initiated logout:**
Support SP-initiated Global Logout: Yes
SP sign LogoutRequest: Yes
SP validate LogoutResponse: No
Global Logout Service URL (LogoutRequest destination):
https://idp.sfcodebot.com/saml/logout
SAML v2 : SP-initiated login:
SP validate LogoutRequest signature: Yes
SP sign LogoutResponse: No
Global Logout Service URL (LogoutResponse destination):
https://idp.sfcodebot.com/saml/logout
SAML v2: Login Response with Http artifact binding
Require ArtifactResolve Signature (sp to idp): No
Require ArtifactResponse Signature (idp to sp): No
**SAML v2: NameID Setting**
Require sp must encrypt all NameID elements : No
NameID Format : unspecified
SAML v2 : SP-initiated login
Enable sp initiated login (AuthnRequest) : Yes
Default issuer : Keep Uncheck
single sign on redirect service location (to be provided by idp) :
https://idp.sfcodebot.com/saml/login
Send request as Company-Wide issuer : Yes
Updated on: 23/08/2024
Thank you!