Salesforce SAML Authentication Configuration
Salesforce supports SAML Single Sign-on and provides a SAML Single Sign-on overview with a Single Sign-on Implementation Guide.
Fortunately, within RapidIdentity Federation, Salesforce SAML authentication configuration is very similar to G Suite SAML authentication configuration.
he preliminary Salesforce SAML authentication configuration steps require that both RapidIdentity Portal and RapidIdentity Federation (IdP) are internet accessible and are configured as described near the top of this page.
Follow these 14 steps to configure Salesforce SAML Authentication.
Navigate to RapidIdentity Appliance | Configuration | IdP Configuration.
Click Click here to download the signing/encryption certificate used by the Identity Provider to download the certificate.
Keep this browser window open since the Base URL and the Logout URL are necessary during later steps.
Next, log into Salesforce with an administrator account and navigate to Security Controls | Single Sign-on Settings.
This table lists the complete URLs necessary to configure each of the respective Salesforce field values.
Table 272. Salesforce Fields' URL ValuesField Name
URL
Issuer
Identity Provider Login URL
Identity Provider Logout URL
Entity ID
The Identity Provider Certificate is available through the RapidIdentity Appliance IdP configuration page. Click the link next to Certificate to download.
Ensure the Name field is set to IdAuto IdP and the API Name is IdAuto_IdP.
Select the remaining values shown in the Salesforce image to complete configuration and then click Save.
Click Download Metadata and then return to the RapidIdentity Appliance IdP Configuration page.
Click Register New Service Provider , paste the metadata into the metadata field, ensure the SSO Advanced Settings match the screenshot below, and click Resister.
Return to the RapidIdentity Appliance IdP Configuration page and click Edit Attributes.
Add a Name ID Attribute with the LDAP Attribute that contains the Salesforce username and a Name Format value of
urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified
.Return to Edit Attribute Mappings to add the newly created attribute, and also ensure that the [INTERNAL] SAML Transient ID attribute is added as a Denied Attribute.
Finally, return to the IdP Provider Configuration page and click Trigger Service Reload and then Trigger Web Reload.
When both reloads are complete, access https://{SALESFORCE DOMAIN}.my.salesforce.com. A properly configured SAML authentication should direct to the user's homepage.