Configure Codebot SSO in Successfactors Provisioning
Access to Successfactors provisioning, click on SSO settings.
![](https://storage.crisp.chat/users/helpdesk/website/e69dd1cbc2540000/68f9859f-e46d-4261-9daf-aa3989_9n42kc.png)
Select For SAML based SSO:
![](https://storage.crisp.chat/users/helpdesk/website/2b1cbad9ebae7e00/b7cba8b3-7ffe-4884-a78c-c39c99_189uhpa.png)
SAML Asserting Parties(IdP): Add a SAML Asserting Party
![](https://storage.crisp.chat/users/helpdesk/website/1a54a150678dd100/f1392223-ad67-4c0d-a740-100053_1ikr0pr.png)
Fill the following fields:
SAML Asserting Party Name: Codebot
SAML Issuer: https://idp.sfcodebot.com/saml/metadata.xml
Require Mandatory Signature: Both
Enable SAML Flag: Enabled
Login Request Signature(SF Generated/SP/RP): No
SAML Profile : Browser/Post Profile Enforce Certificate Valid Period : Yes
SAML Verifying Certificate:
-----BEGIN CERTIFICATE-----
MIICbjCCAdegAwIBAgIBADANBgkqhkiG9w0BAQ0FADBUMQswCQYDVQQGEwJ1czEOMAwGA1UECA wFVGV4YXMxETAPBgNVBAoMCE5ldDJBcHBzMRAwDgYDVQQDDAdDb2RlQm90MRAwDgYDVQQLD AdDb2RlQm90MB4XDTIzMDEyNjEwMTYxNFoXDTI2MDEyNTEwMTYxNFowVDELMAkGA1UEBhMCdX MxDjAMBgNVBAgMBVRleGFzMREwDwYDVQQKDAhOZXQyQXBwczEQMA4GA1UEAwwHQ29kZUJvd DEQMA4GA1UECwwHQ29kZUJvdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA45D21YzFO6
QPR6MQ19NTcaYcidGPCwZwHvlc6tHB8cwV6IBA8j5pwGgmqAJbIePjd86tUWyEy2VQXMgS4yEno32X7 ik14YJkZExIOp/mE5u56kHYzz2xavRWW+zvgFGS1jG6F7UAkfA/7dr2XJKPER2zQdLLr4HDq9kU98fryb8 CAwEAAaNQME4wHQYDVR0OBBYEFJbwm8ppaRUkP1gTFMxPhvhk6CgEMB8GA1UdIwQYMBaAFJb
wm8ppaRUkP1gTFMxPhvhk6CgEMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEADZPT fylixJcDZJNZc6wWFVkHBU1p21tQQUDP6htL7AYZ91IhnG2JUm4boNT+gM+X/SlGb4QL8+L5axJqbVMX tbljGUpyrYzlVF85mKvrwVan/ZcF/6Nh19BYa3+5Fh6+1ERfUWKBJ42CPJdgya6VJ8V/iZyAfUI2M1oc+iuCc yc=
-----END CERTIFICATE-----
![](https://storage.crisp.chat/users/helpdesk/website/bbd2de35d117f000/5f90a05a-7e7a-4114-a0fc-6f3d60_129a5fe.png)
Please enter the redirect URL when logout: https://idp.sfcodebot.com/saml/logout
Please enter the redirect URL when session timeout: https://idp.sfcodebot.com/saml/logout
Please enter the URL for Invalid Login URL redirect: https://idp.sfcodebot.com/saml/logout
**SAML v2 : SP-initiated logout:**
![](https://storage.crisp.chat/users/helpdesk/website/29cd0767762aba00/2120b2e7-f5e2-498f-8c31-bbb106_hlgub6.png)
Support SP-initiated Global Logout: Yes
SP sign LogoutRequest: Yes
SP validate LogoutResponse: No
Global Logout Service URL (LogoutRequest destination):
https://idp.sfcodebot.com/saml/logout
SAML v2 : SP-initiated login:
![](https://storage.crisp.chat/users/helpdesk/website/f12a21b7bec1d000/8545775d-ca33-4e53-ba24-5b99be_1hhn2o2.png)
SP validate LogoutRequest signature: Yes
SP sign LogoutResponse: No
Global Logout Service URL (LogoutResponse destination):
https://idp.sfcodebot.com/saml/logout
SAML v2: Login Response with Http artifact binding
![](https://storage.crisp.chat/users/helpdesk/website/d2da6df683ecb800/7939ce9e-cc09-460a-9cee-cf49fa_wr271j.png)
Require ArtifactResolve Signature (sp to idp): No
Require ArtifactResponse Signature (idp to sp): No
**SAML v2: NameID Setting**
![](https://downloads.intercomcdn.com/i/o/851072968/cac22a0776f072d6f1f85504/image.png)
Require sp must encrypt all NameID elements : No
NameID Format : unspecified
SAML v2 : SP-initiated login
![](https://downloads.intercomcdn.com/i/o/851073644/a5164cfd146a490d384fd44f/image.png)
Enable sp initiated login (AuthnRequest) : Yes
Default issuer : Keep Uncheck
single sign on redirect service location (to be provided by idp) :
https://idp.sfcodebot.com/saml/login
Send request as Company-Wide issuer : Yes
Updated on: 23/08/2024
Thank you!