Articles on: Platform & Setup

Configure Codebot SSO in Successfactors Provisioning

Access to Successfactors provisioning, click on SSO settings.



Select For SAML based SSO:



SAML Asserting Parties(IdP): Add a SAML Asserting Party



Fill the following fields:


SAML Asserting Party Name: Codebot


SAML Issuer: https://idp.sfcodebot.com/saml/metadata.xml


Require Mandatory Signature: Both


Enable SAML Flag: Enabled


Login Request Signature(SF Generated/SP/RP): No


SAML Profile : Browser/Post Profile Enforce Certificate Valid Period : Yes


SAML Verifying Certificate:


-----BEGIN CERTIFICATE-----


MIICbjCCAdegAwIBAgIBADANBgkqhkiG9w0BAQ0FADBUMQswCQYDVQQGEwJ1czEOMAwGA1UECA wFVGV4YXMxETAPBgNVBAoMCE5ldDJBcHBzMRAwDgYDVQQDDAdDb2RlQm90MRAwDgYDVQQLD AdDb2RlQm90MB4XDTIzMDEyNjEwMTYxNFoXDTI2MDEyNTEwMTYxNFowVDELMAkGA1UEBhMCdX MxDjAMBgNVBAgMBVRleGFzMREwDwYDVQQKDAhOZXQyQXBwczEQMA4GA1UEAwwHQ29kZUJvd DEQMA4GA1UECwwHQ29kZUJvdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA45D21YzFO6


QPR6MQ19NTcaYcidGPCwZwHvlc6tHB8cwV6IBA8j5pwGgmqAJbIePjd86tUWyEy2VQXMgS4yEno32X7 ik14YJkZExIOp/mE5u56kHYzz2xavRWW+zvgFGS1jG6F7UAkfA/7dr2XJKPER2zQdLLr4HDq9kU98fryb8 CAwEAAaNQME4wHQYDVR0OBBYEFJbwm8ppaRUkP1gTFMxPhvhk6CgEMB8GA1UdIwQYMBaAFJb


wm8ppaRUkP1gTFMxPhvhk6CgEMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEADZPT fylixJcDZJNZc6wWFVkHBU1p21tQQUDP6htL7AYZ91IhnG2JUm4boNT+gM+X/SlGb4QL8+L5axJqbVMX tbljGUpyrYzlVF85mKvrwVan/ZcF/6Nh19BYa3+5Fh6+1ERfUWKBJ42CPJdgya6VJ8V/iZyAfUI2M1oc+iuCc yc=


-----END CERTIFICATE-----



Please enter the redirect URL when logout: https://idp.sfcodebot.com/saml/logout


Please enter the redirect URL when session timeout: https://idp.sfcodebot.com/saml/logout


Please enter the URL for Invalid Login URL redirect: https://idp.sfcodebot.com/saml/logout


SAML v2 : SP-initiated logout:



Support SP-initiated Global Logout: Yes


SP sign LogoutRequest: Yes


SP validate LogoutResponse: No


Global Logout Service URL (LogoutRequest destination):


https://idp.sfcodebot.com/saml/logout


SAML v2 : SP-initiated login:



SP validate LogoutRequest signature: Yes


SP sign LogoutResponse: No


Global Logout Service URL (LogoutResponse destination):


https://idp.sfcodebot.com/saml/logout


SAML v2: Login Response with Http artifact binding



Require ArtifactResolve Signature (sp to idp): No


Require ArtifactResponse Signature (idp to sp): No


SAML v2: NameID Setting



Require sp must encrypt all NameID elements : No


NameID Format : unspecified


SAML v2 : SP-initiated login



Enable sp initiated login (AuthnRequest) : Yes


Default issuer : Keep Uncheck


single sign on redirect service location (to be provided by idp) :


https://idp.sfcodebot.com/saml/login


Send request as Company-Wide issuer : Yes

Updated on: 23/08/2024

Was this article helpful?

Share your feedback

Cancel

Thank you!