To use your own certificate, you must click Browse to upload an archive file (.p12 or. Select this option to use your organization’s own certificate. Use a certificate with a private key (pfx file) from your local storage Select this option to use CyberArk Identity standard certificate. Use the default tenant signing certificate It’s not necessary to select this option-it’s present to display the current certificate in use. When selected the certificate currently in use is displayed. Select an option to change the signing certificate. Just be sure to use a matching certificate both in the application settings in the Identity Administration portal and in the application itself. These settings specify the signing certificate used for secure SSO authentication between CyberArk Identity and the web application. If this web application is added only to provide SAML for a corresponding mobile app, deselect this option so the web application won’t display for users in the user portal. Select Show in User app list to display this web application in the user portal. The Application ID is case-sensitive and can be any combination of letters, numbers, spaces, and special characters up to 256 characters. There can only be one SAML application deployed with the name used by the mobile application. If you change the name of the web application that corresponds to the mobile application, you need to enter the original application name in the Application ID field. The Application ID has to be the same as the text string that is specified as the target in the code of the mobile application written using the mobile SDK. CyberArk Identity uses the Application ID to provide single sign-on to mobile applications. On the Application Settings page, expand the Additional Options section and specify the following settings:Ĭonfigure this field if you are deploying a mobile application that uses the CyberArk mobile SDK. See CyberArk-issued derived credentials for more information. (Optional) On the Application Settings page, click Enable Derived Credentials for this app on enrolled devices (opens in built-in browser) to use derived credentials on enrolled mobile devices to authenticate with this application. You need this information to configure the SSO End Point in Parature Service Desk, as described in Step 3.Įnter the SP Entity ID (provided by your Parature CSM). See Choose a certificate file for the latest information.Ĭopy the IdP Metadata URL and send it to your Parature Self-Service Portal Customer Success Manager (CSM).Ĭopy the SSO Connection Id (Entity Id). The description of how to choose and download a signing certificate in this document might differ slightly from your experience. Users can set their passwords on the My Profile page.Ĭonfigure Parature Self-Service Portal in the Identity Administration portal Parature Self-Service Portal supports Just-In-Time User Provisioning. User or Administrator account lockout risk The following table lists features and functionality specific to Parature Self-Service Portal. What you need to know about Parature Self-Service PortalĮach SAML application is different. You also upload the public key certificate in a. p12 file to the application settings in the Identity Administration portal. If you use your own certificate, you upload the signing certificate and its private key in a. To establish a trusted connection between the web application and CyberArk Identity, you need to have the same signing certificate in both the application and the application settings in the Identity Administration portal. You can either download one from the Identity Administration portal or use your organization’s trusted certificate. Parature Self-Service Portal requirements for SSOīefore you configure the Parature Self-Service Portal server for SSO, you need the following:Īn active Parature Service Desk account (SSO to Parature Self-Service Portal is configured here) with administrator rights for your organization. For details, see Configure Parature Self-Service Portal on its web site.Īfter you are done configuring the application settings in the Identity Administration portal and the Parature Self-Service Portal application, users are ready to launch the application from the Identity User Portal. To configure Parature Self-Service Portal for SSO, copy settings from the Application Settings page in the Identity Administration portal, and paste them into fields on the Parature Self-Service Portal website. This process may take time be sure to factor in the extra time in your application configuration plan.Ĭonfigure the Parature Self-Service Portal application for single sign-on. You need to exchange metadata with Parature in order to configure the Parature Self-Service Portal application.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |