How to configure single sign-on for Salesforce
ADSelfService Plus supports Active Directory (AD)-based single sign-on (SSO) for Salesforce and any other SAML-enabled application. Upon enabling SSO for Salesforce in ADSelfService Plus, all users have to do is simply log in to their Windows machines using their AD domain credentials. Once logged in, users can securely access Salesforce in one click without having to enter their username and password again.
ADSelfService Plus supports both Identity Provider (IdP) and Service Provider (SP)-initiated SSO for Salesforce.
IdP-initiated SSO for Salesforce: Users need to log in to the ADSelfService Plus self-service portal first, and then click on the Salesforce icon on the Applications dashboard to access Salesforce.
SP-initiated SSO for Salesforce: Users can access their Salesforce domain via a URL or bookmark. They will automatically be redirected to the ADSelfService Plus portal for login. Once they've signed on, they'll be automatically redirected and logged into the Salesforce portal.
Follow the step-by-step guide given below for Salesforce SSO
Before you begin
Download and install ADSelfService Plus if you haven’t already.
Configuring your Active Directory domain in ADSelfService Plus
With ADSelfService Plus, you can use the existing AD domain credentials of users for authentication during SSO. So, first you need to configure an AD domain in ADSelfService Plus to enable SSO for Salesforce.
ADSelfService Plus will try to automatically add all the domains that it can discover in your network. If your domains are automatically added, skip to Step 9; otherwise, follow Steps 1-8 to add them manually.
- Launch the ADSelfService Plus web console and log in using admin credentials.
- Click the Domain Settings link available on the top-right corner of the application.
- An Add Domain Details window will appear.
- In the Domain Name field, enter the name of the domain you want to add.
- In the Add Domain Controllers field, click Discover. ADSelfService Plus will try to automatically discover the domain controllers associated with the domain.
- If the domains are not auto-discovered, then enter the domain controller name in the field provided, and click Add.
- You can leave the authentication fields empty if you're not going to use the end user self-service features of ADSelfService Plus.
- Back in the Add Domain Details window, click Add to complete adding the domain in ADSelfService Plus.
Getting the SAML details from ADSelfService Plus
- Navigate to Configuration → Self-service → Password Sync/Single Sign On.
- Click Salesforce in the list of applications provided.
- Click Download SSO Certificate in the top-right corner of the screen.
- In the pop-up that appears, copy the Login URL, Logout URL, and download the SSO certificate by clicking the Download SSO Certificate button.
Configuring SSO settings in Salesforce.
- Log in to Salesforce with administrator credentials.
- Select Setup Single Sign-On (SSO) option from the Security Controls tab.
- In the Single Sign-On Settings page, click Edit and select the SAML Enabled check box. Click Save.
- Now, in the SAML Single Sign-On Settings section, click New.
- Enter a Name and API Name for reference.
- In the Issuer field, enter the Login URL value from Step 12.
- In the Identity Provider Certificate field, click Choose File and upload the SSO certificate you downloaded in Step 12.
- In the Identity Provider Login URL field, enter the Login URL value from Step 12.
- In the Identity Provider Logout URL field, enter the Logout URL value from Step 12.
- Click Save at the top.
- Once you click Save, a Login URL will be displayed at the bottom in the Endpoints section. Copy the URL value and keep it safe.
- Now, you need to configure the authentication method.
- Navigate to Domain Management → Domain.
- Under Authentication Configuration, click Edit.
- Select the ADSelfService Plus SAML SSO configuration and click save.
Adding your Salesforce domain in ADSelfService Plus and enabling SSO
- Now, switch to ADSelfService Plus’ Salesforce configuration page.
- Choose Single sign-on under Modules.
- In the SAML Redirect URL field, enter the Login URL from Step 23.
- In the Domain Name field, enter the domain name for which you just enabled SSO.
- In the Display Name field, provide an appropriate display name.
- In the Available Policies field, click the drop-down box and select the policies for which you wish to enable SSO. The policy you select will determine which users have the SSO feature enabled.
Note: ADSelfService Plus allows you to create OU and group-based policies for your AD domains. To create a policy, go to Configuration → Self-Service → Policy Configuration → Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature. Finally, click Save Policy.
- Click Save.
Your users can now log into their Salesforce accounts automatically using single sign-on.
Unify access to cloud and on-premises applications using SAML SSO.
Free Active Directory users from attending lengthy help desk calls by allowing them to self-service their password resets/ account unlock tasks. Hassle-free password change for Active Directory users with ADSelfService Plus ‘Change Password’ console.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications with their Active Directory credentials. Thanks to ADSelfService Plus!
Intimate Active Directory users of their impending password/account expiry by mailing them these password/account expiry notifications.
Synchronize Windows Active Directory user password/account changes across multiple systems, automatically, including Office 365, G Suite, IBM iSeries and more.
Ensure strong user passwords that resist various hacking threats with ADSelfService Plus by enforcing Active Directory users to adhere to compliant passwords via displaying password complexity requirements.
Portal that lets Active Directory users update their latest information and a quick search facility to scout for information about peers by using search keys, like contact number, of the personality being searched.