8.7 Configuring Integration with Salesforce

This section provides the configuration information on integrating Advanced Authentication with Salesforce. This integration secures the Salesforce connection.

The following diagram represents Advanced Authentication in Salesforce.

To configure the Advanced Authentication integration with Salesforce, perform the following configuration tasks:

8.7.1 Configuring the Salesforce Domain Name

  1. Login to your Salesforce account.

  2. Create a domain. If the domain is not created, then perform the following tasks:

    1. Click Gear and select Setup Home in the Lightning Experience interface.

    2. Scroll down the setup toolbar and navigate to Company Settings.

    3. Click My Domain.

    4. Specify your domain name and click Save.

      The domain is activated. Use your domain name to open Salesforce. For example, https://CompanyName.my.salesforce.com/. SAML provider requires the domain name.

8.7.2 Configuring the SAML Provider

  1. Click Settings > Identity > Single Sign-On Settings.

  2. Create a text file and add the following Identity Provider certificate to the file.

    -----BEGIN CERTIFICATE-----
    MIIDkzCCAnugAwIBAgIESsmdMzANBgkqhkiG9w0BAQsFADB6MRAwDgYDVQQGEwdVbmtub3duMRAw
    DgYDVQQIEwdVbmtub3duMRAwDgYDVQQHEwdVbmtub3duMREwDwYDVQQKEwhBdXRoYXNhczESMBAG
    A1UECxMJQXV0aGFzYXNhMRswGQYDVQQDExJvc3AuYXV0aGFzYXMubG9jYWwwHhcNMTYwNTI2MDUz
    NjI0WhcNMjYwNDA0MDUzNjI0WjB6MRAwDgYDVQQGEwdVbmtub3duMRAwDgYDVQQIEwdVbmtub3du
    MRAwDgYDVQQHEwdVbmtub3duMREwDwYDVQQKEwhBdXRoYXNhczESMBAGA1UECxMJQXV0aGFzYXNh
    MRswGQYDVQQDExJvc3AuYXV0aGFzYXMubG9jYWwwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
    AoIBAQCw3YLz03qhSZPXjBc/Ws+cZ2/E5oogqKeJ3p4RR6USOoarjnmvQPq+maRfvexriwQjRDgS
    OFRb58cert/misqzsHBVmQDnfMwicFVzuuKjDEbWFp9vL1gRkDzIlpCyl3eNmBWuWXM49Z6mm8XS
    fIwlAoydNp5DK0o0Yrk6FNOi0nOrnI5kHGVD0bd5SpDtvXSF1WLfc5YT9UBUpfZneKsVPWSkbeBX
    F84hYJWBtdzcTEyjdso9Ra7UtxLIUW0UH3LWTgn9zS97nLkmhetmD1I3mEAeAE9SAmqTRyH1FNXZ
    ZOfi/BJF4+sz86f6pBbwYM2KTvXaABgzSpZpJ1pQrZKPAgMBAAGjITAfMB0GA1UdDgQWBBTL8PbA
    +e6YkBIk4yELTZ+AbfdA6DANBgkqhkiG9w0BAQsFAAOCAQEAm87lNyAO8CtN5jlLe3CupLAAbUWR
    NY6av7LpPail1JRIw+uvddMyOz1vOS1IwpDDNtcPtxGXsaZI1CKgNPBpLvSxePVUXNfFgUCtu+bT
    cuUtiQbkiDWwFLmAS6KeA+EBFOeqBiudEfkAZZT87DF9gKvM6VWdzJ7BvWi2YPbH/FRM82fLoyAd
    RbphF215we3rvsfeWbwXw70UGNyBUTb3zUcAmB3sHbcZiXJZj3pJYgDaN9Ss60sz/yG1ZLEYluvL
    R1T2PPEfEcA1Eij0R1A31Z5hJ3zDlXoCeNYLoMg4522QYekTwvQeWkeYejBXEcxdL7VP6F91zmfZ
    bm1A4PY5jw==
    -----END CERTIFICATE-----
  3. In Single Sign-On Settings, click New and specify the following details:

    1. Name: Advanced Authentication.

    2. API Name: AAF.

    3. Issuer: https://AdvancedAuthenticationServerAddress/osp/a/TOP/auth/saml2/metadata, where you must replace AdvancedAuthenticationServerAddress with the domain name or IP address of your Advanced Authentication server.

    4. Entity ID: https://CompanyName.my.salesforce.com/.

    5. Click Browse to open the Identity Provider certificate.

    6. SAML Identity Type: Select Assertion contains the Federation ID from the User object.

    7. SAML Identity Location: Select Identity is in an Attribute element.

    8. Attribute Name: upn.

    9. Service Provider Initiated Request Binding: Select HTTP Redirect.

    10. Identity Provider Login URL: https://AdvancedAuthenticationServerAddress/osp/a/TOP/auth/saml2/sso.

    11. Select User Provisioning Enabled.

    12. Click Save.

  4. Click Edit for Federated Single Sign-On Using SAML.

  5. Select SAML Enabled.

  6. Click Save.

  7. Click Settings > Users.

  8. Click Edit for the required Salesforce users by adding Federation ID for the user accounts. The Federation ID corresponds to userPrincipalName attribute in Active Directory. For example, pjones@company.com.

    NOTE:The name that you specify in Federation ID is case sensitive. The following error may occur, if you ignore the case:

    We can't log you in. Check for an invalid assertion in the SAML Assertion Validator (available in Single-Sign On Settings) or check the login history for failed logins.
  9. Click your profile icon and click Switch to Salesforce Classic.

    This mode is required to tune the domain options.

  10. Click Setup Administrator > Domain Management > My Domain > Edit to access the Authentication Configuration screen.

  11. Select Login Page and osp options.

  12. Click Save.

8.7.3 Configuring the Advanced Authentication SAML 2.0 Event

  1. Click username > Switch to Lightning Experience.

  2. Click Gear and select Setup Home.

  3. Navigate to Identity > Single Sign-On Settings.

  4. Click the created configuration (not for Edit).

  5. Click Download Metadata.

  6. Open the Advanced Authentication Administration portal.

  7. Click Events > Add to add a new event.

  8. Create an event with the following parameters.

    • Name: Salesforce

    • Chains: select the required chains.

    • Click Browse to Upload SP SAML 2.0 metadata file. Open the Salesforce metadata file and click Save.

8.7.4 Configuring to Authenticate on Salesforce with SAML 2.0

  1. Click Policies > Web Authentication.

  2. Set Identity provider URL to https://AdvancedAuthenticationServerAddress/ and replace AdvancedAuthenticationServerAddress with domain name or IP address of your Advanced Authentication server.

    NOTE:To use multiple Advanced Authentication servers with SAML 2.0, you must do the following:

    1. Configure an external .

    2. Specify the address with port number in Identity provider URL instead of specifying an address of a single Advanced Authentication server.

    IMPORTANT:You must use the server name or IP address specified in the Issuer field of Salesforce.

  3. Open the URL https://CompanyName.my.salesforce.com/ and click Advanced Authentication to check the SAML 2.0 authentication.