Page History
...
- Sign up as a Salesforce developer if you don't have an account. If you already have an account, move on to step 2 and log in to Salesforce.
- Fill out the relevant information found in the following URL: https://developer.salesforce.com/signup
- Click Sign me up.
- You will receive a security token by email to confirm your new account. If you did not receive the email successfully, you will be able to reset it by following the steps given here.
Log in with your new credentials as a Salesforce developer. Do this by clicking the Login link in the top right hand side of https://login.salesforce.com/.
Note title Note! This document is explained using the Salesforce lightning theme. If you are using the classic theme, follow the steps given below to switch to the lightning theme:
Expand title Click here to find the steps on how to switch from the classic to the lightning theme. - Click your username to expand the drop down.
- Click Switch to Lightning Experience.
- Click the settingS settings icon on the top-right-hand corner, and click Set Up.
Now you are navigated to the lightening theme of Salesforce.
- Click Allow to enable Salesforce to access your basic information.
Once you are logged in, create a new domain and access it.
Tip Tip: This step is required only if the validation request is sent by the service provider. For identity provider initiated validation requests, this is not required.
To do this, do the following steps.
Excerpt Include Logging in to Salesforce with Facebook Logging in to Salesforce with Facebook nopanel true - On the left navigation menu, search for Single Sign-On Settings, and click it.
- In the page that appears, click Edit and then select the SAML Enabled checkbox to enable federated single sign-on using SAML.
- Click Save to save this configuration change.
Click New under SAML Single Sign-On Settings. The following screen appears.
Ensure that you configure the following properties.Field Value Name SSO API Name SSO Issuer localhost
Note Note: In this case we have localhost as the Issuer as this topic is a sample of how this should work. In a production environment where you need to run this scenario, you must have the domain name or host name of the server that you are hosting the WSO2 Identity Server.
Entity Id http://saml.salesforce.com Identity Provider Certificate wso2.crt
Note Note: To create the Identity Provider Certificate, open your Command Line interface, traverse to the
<IS_HOME>/repository/resources/security/
directory. Next you must execute the following command.Code Block keytool -export -alias wso2carbon -file wso2.crt -keystore wso2carbon.jks -storepass wso2carbon
Once this command is run, the wso2.crt file is generated and can be found in the
<IS_HOME>/repository/resources/security/
directory. Click Choose File and navigate to this location in order to obtain and upload this file.Request Signing Certificate From the dropdown, you must select the public certificate of Salesforce. If you have not created this already, check step 15 of this section for details on how to create the certificate. Request Signature Method RSA-SHA1 Assertion Decryption Certificate Assertion not encrypted SAML Identity Type Assertion contains User's salesforce.com username
SAML Identity Location Identity is in the NameIdentifier element of the Subject statement
Identity Provider Login URL https://localhost:9443/samlsso
Note Note: In this case we have localhost as the URL as this topic is a sample of how this should work. In a production environment where you need to run this scenario, you must have the domain name or host name of the server that you are hosting the WSO2 Identity Server.
Identity Provider Logout URL https://localhost:9443/samlsso
Note Note: In this case we have localhost as the URL as this topic is a sample of how this should work. In a production environment where you need to run this scenario, you must have the domain name or host name of the server that you are hosting the WSO2 Identity Server.
Custom Error URL Leave blank Service Provider Initiated Request Binding
HTTP POST User Provisioning Enabled Leave blank - Click Save to save your configurations.
- Go to Domain Management in the left navigation pane and click My Domain.
- Click Deploy to Users. Click Ok to the confirmation message that appears.
- In the page that appears, you must configure the Authentication Configuration section. Scroll down to this section and click Edit.
- Under Authentication Service, select SSO instead of Login Page.
- Click Save.
Next you need to obtain the Salesforce certificate and upload it to the Identity Server.
Info title About the Salesforce certificate The validation request sent from Salesforce must be validated by the Identity Server. For this purpose, the Salesforce public certificate must be uploaded to the Identity Server and is used to validate the request.
Do the following steps to obtain the certificate.
- On the left navigation menu, go to Security Controls and click Certificate and Key Management.
- If you have not done so already, you must create the certificate first. Do the following steps to create this.
- Click Create Self-Signed Certificate.
- Enter the Label and a Unique Name and click Save. The certificate is generated.
- Click the Download Certificate button to download the certificate.
...