Articles on: Platform & Setup

Configure Codebot SSO in Successfactors Provisioning

Access to Successfactors provisioning, click on SSO settings.





Select For SAML based SSO:





SAML Asserting Parties(IdP): Add a SAML Asserting Party





Fill the following fields:



SAML Asserting Party Name: Codebot

SAML Issuer: https://idp.sfcodebot.com/saml/metadata.xml

Require Mandatory Signature: Both

Enable SAML Flag: Enabled

Login Request Signature(SF Generated/SP/RP): No

SAML Profile : Browser/Post Profile Enforce Certificate Valid Period : Yes

SAML Verifying Certificate:

-----BEGIN CERTIFICATE-----

MIICbjCCAdegAwIBAgIBADANBgkqhkiG9w0BAQ0FADBUMQswCQYDVQQGEwJ1czEOMAwGA1UECA wFVGV4YXMxETAPBgNVBAoMCE5ldDJBcHBzMRAwDgYDVQQDDAdDb2RlQm90MRAwDgYDVQQLD AdDb2RlQm90MB4XDTIzMDEyNjEwMTYxNFoXDTI2MDEyNTEwMTYxNFowVDELMAkGA1UEBhMCdX MxDjAMBgNVBAgMBVRleGFzMREwDwYDVQQKDAhOZXQyQXBwczEQMA4GA1UEAwwHQ29kZUJvd DEQMA4GA1UECwwHQ29kZUJvdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA45D21YzFO6

QPR6MQ19NTcaYcidGPCwZwHvlc6tHB8cwV6IBA8j5pwGgmqAJbIePjd86tUWyEy2VQXMgS4yEno32X7 ik14YJkZExIOp/mE5u56kHYzz2xavRWW+zvgFGS1jG6F7UAkfA/7dr2XJKPER2zQdLLr4HDq9kU98fryb8 CAwEAAaNQME4wHQYDVR0OBBYEFJbwm8ppaRUkP1gTFMxPhvhk6CgEMB8GA1UdIwQYMBaAFJb

wm8ppaRUkP1gTFMxPhvhk6CgEMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEADZPT fylixJcDZJNZc6wWFVkHBU1p21tQQUDP6htL7AYZ91IhnG2JUm4boNT+gM+X/SlGb4QL8+L5axJqbVMX tbljGUpyrYzlVF85mKvrwVan/ZcF/6Nh19BYa3+5Fh6+1ERfUWKBJ42CPJdgya6VJ8V/iZyAfUI2M1oc+iuCc yc=

-----END CERTIFICATE-----



Please enter the redirect URL when logout: https://idp.sfcodebot.com/saml/logout

Please enter the redirect URL when session timeout: https://idp.sfcodebot.com/saml/logout

Please enter the URL for Invalid Login URL redirect: https://idp.sfcodebot.com/saml/logout

**SAML v2 : SP-initiated logout:**





Support SP-initiated Global Logout: Yes



SP sign LogoutRequest: Yes



SP validate LogoutResponse: No



Global Logout Service URL (LogoutRequest destination):



https://idp.sfcodebot.com/saml/logout



SAML v2 : SP-initiated login:





SP validate LogoutRequest signature: Yes



SP sign LogoutResponse: No



Global Logout Service URL (LogoutResponse destination):



https://idp.sfcodebot.com/saml/logout



SAML v2: Login Response with Http artifact binding





Require ArtifactResolve Signature (sp to idp): No

Require ArtifactResponse Signature (idp to sp): No

**SAML v2: NameID Setting**





Require sp must encrypt all NameID elements : No

NameID Format : unspecified

SAML v2 : SP-initiated login





Enable sp initiated login (AuthnRequest) : Yes



Default issuer : Keep Uncheck



single sign on redirect service location (to be provided by idp) :



https://idp.sfcodebot.com/saml/login



Send request as Company-Wide issuer : Yes

Updated on: 23/08/2024

Was this article helpful?

Share your feedback

Cancel

Thank you!