![]() In Okta, select the General tab for the Keeper Password Manager and Digital Vault app, then click Edit.Įnter the Entity ID value you saved earlier (step 19) into the Server Base URL field. Save the Entity ID value from the Service Provider section. Identity Provider Attribute Mappings: Leave the following default values: pfx file (step 1).Įnter your Password for Private Key (if you have one). Ĭheck Use Certificate to Decrypt and Sign SAML Response/Request. ![]() The first time you log in, you will be prompted to select the SSO Connection from the admin console. Login to the Keeper SSO Connect application with your Keeper Administrator email address and master password. ![]() OPTIONAL: Select Dynamically provision users upon successful login to SSO if you want to enable Just In Time (JIT) provisioning.ĭownload and install the Keeper SSO Connect application: This alias should be named something that is easy for your users to remember because they may need to type the name into their mobile and apps (iOS, Android, Mac, Windows) upon first logging into a new device. Select the Bridge/SSO tab, then select + SSO Connection:Įnter your Enterprise Domain alias. (In the below example, we named the node Support Department and added it beneath the root node.) To display the node structure, select Advanced Configuration, then Show Node Structure:Ĭlick the + (plus) icon to create a new node that will host the Keeper SSO Connect integration:Įnter a node name, then click Create. SSO integration is applied to specific nodes (organizational units) within your Admin Console. Login to the Admin Console at and login as the Keeper Administrator. Save the following metadata file as metadata.xml: Sign in to Okta Admin app to have this variable generated for you. Refresh these instructions in your browser or close them and click View Setup Instructions again. Keeper Password Manager For Edge LoginAsk is here to help you access Keeper Password Manager For Edge quickly and handle each specific case you encounter. crt you generated when you created your self-signed. Signature Certificate: Click Browse to locate, then Upload to upload the. In Okta, select the Sign On tab for the Keeper Password Manager and Digital Vault app, then click Edit. (for example, if your username is johnsmith, you will see the files under johnsmith in your system directory. Note: The certificates will be in your user directory. Generate PKCS#12 file: openssl pkcs12 -keypbe PBE-SHA1-3DES -certpbe PBE-SHA1-3DES -export -in certificate.crt -inkey privatekey.pem -out requiredkey.pfx -name “displayed-name” Generate certificate: openssl req -x509 -sha256 -days 365 -key privatekey.pem -in certificaterequest.csr -out certificate.crt Generate request: openssl req -new -sha256 -key privatekey.pem -out certificaterequest.csr Generate private key: openssl genrsa -out privatekey.pem 2048 Open your terminal and type the following commands: Generate two certificates (Personal Exchange Format (PFX) and Certificate file (CRT)): The Okta/Keeper Password Manager and Digital Vault SAML integration currently supports the following features: ![]() Please use the Okta Administrator Dashboard to add an application and view the values that are specific for your organization. This setup might fail without parameter values that are customized for your organization. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |