Articles on: Platform Related Articles

Configure Codebot SSO in Successfactors Provisioning

Access to Successfactors provisioning, click on SSO settings.





**Select For SAML based SSO:**





**SAML Asserting Parties(IdP): Add a SAML Asserting Party**





**Fill the following fields:**



SAML Asserting Party Name : Codebot

SAML Issuer : https://idp.sfcodebot.com/saml/metadata.xml

Require Mandatory Signature : Both

Enable SAML Flag : Enabled

Login Request Signature(SF Generated/SP/RP): No

SAML Profile : Browser/Post Profile Enforce Certificate Valid Period : Yes

SAML Verifying Certificate :

-----BEGIN CERTIFICATE-----

MIICbjCCAdegAwIBAgIBADANBgkqhkiG9w0BAQ0FADBUMQswCQYDVQQGEwJ1czEOMAwGA1UECA wFVGV4YXMxETAPBgNVBAoMCE5ldDJBcHBzMRAwDgYDVQQDDAdDb2RlQm90MRAwDgYDVQQLD AdDb2RlQm90MB4XDTIzMDEyNjEwMTYxNFoXDTI2MDEyNTEwMTYxNFowVDELMAkGA1UEBhMCdX MxDjAMBgNVBAgMBVRleGFzMREwDwYDVQQKDAhOZXQyQXBwczEQMA4GA1UEAwwHQ29kZUJvd DEQMA4GA1UECwwHQ29kZUJvdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA45D21YzFO6

QPR6MQ19NTcaYcidGPCwZwHvlc6tHB8cwV6IBA8j5pwGgmqAJbIePjd86tUWyEy2VQXMgS4yEno32X7 ik14YJkZExIOp/mE5u56kHYzz2xavRWW+zvgFGS1jG6F7UAkfA/7dr2XJKPER2zQdLLr4HDq9kU98fryb8 CAwEAAaNQME4wHQYDVR0OBBYEFJbwm8ppaRUkP1gTFMxPhvhk6CgEMB8GA1UdIwQYMBaAFJb

wm8ppaRUkP1gTFMxPhvhk6CgEMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEADZPT fylixJcDZJNZc6wWFVkHBU1p21tQQUDP6htL7AYZ91IhnG2JUm4boNT+gM+X/SlGb4QL8+L5axJqbVMX tbljGUpyrYzlVF85mKvrwVan/ZcF/6Nh19BYa3+5Fh6+1ERfUWKBJ42CPJdgya6VJ8V/iZyAfUI2M1oc+iuCc yc=

-----END CERTIFICATE-----



Please enter the redirect URL when logout:

https://idp.sfcodebot.com/saml/logout

Please enter the redirect URL when session timeout: https://idp.sfcodebot.com/saml/logout

Please enter the URL for Invalid Login URL redirect: https://idp.sfcodebot.com/saml/logout

**SAML v2 : SP-initiated logout:**





Support SP-initiated Global Logout: Yes



**SP sign LogoutRequest:** Yes



**SP validate LogoutResponse:** No



**Global Logout Service URL (LogoutRequest destination):**



https://idp.sfcodebot.com/saml/logout



**SAML v2 : SP-initiated login**





**SP validate LogoutRequest signature**: Yes



**SP sign LogoutResponse:** No



**Global Logout Service URL (LogoutResponse destination):**



https://idp.sfcodebot.com/saml/logout



**SAML v2: Login Response with Http artifact binding**





Require ArtifactResolve Signature (sp to idp): No

Require ArtifactResponse Signature (idp to sp): No

**SAML v2: NameID Setting**





Require sp must encrypt all NameID elements : No

NameID Format : unspecified

**SAML v2 : SP-initiated login**





Enable sp initiated login (AuthnRequest) : Yes



**Default issuer :** Keep Uncheck



single sign on redirect service location (to be provided by idp) :



https://idp.sfcodebot.com/saml/login



**Send request as Company-Wide issuer :** Yes

Updated on: 21/05/2024

Was this article helpful?

Share your feedback

Cancel

Thank you!