Okta

How to Configure SAML 2.0 for BMC Remedyforce

Contents


Supported Features

The Okta/BMC Remedyforce SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.


Configuration Steps

  1. Login to your BMC Remedyforce account as an administrator.

  2. Navigate to Setup > Security Controls > Single Sign-On Settings, then click Edit:

    bmc_newa.png

  3. Select the SAML Enabled checkbox then click Save:

    bmc_newb.png

  4. Click New:

    bmc_newc.png

  5. Follow the steps below:

    • Name: Enter a preferred name.

    • Issuer: Copy and paste the following:

      Sign into the Okta Admin dashboard to generate this value

    • Identity Provider Certificate: Download, then upload the following certificate:

      Sign in to the Okta Admin dashboard to generate this value.

    • Request Signing Certificate: Select Generate self-signed certificate.

    • Request Signing Method: Select RSA-SHA256.

    • Assertion Decryption Certificate: Select Assertion not encrypted.

    • SAML Identity Type: Select Assertion contains the User's Salesforce username.

    • SAML Identity Location: Select Identity is in the Nameidentifier element of the Subject statement.

    • Identity Provider Login URL: Copy the following:

      Sign into the Okta Admin dashboard to generate this value

    • Custom Logout URL: Copy and paste the following:

      Sign into the Okta Admin dashboard to generate this value

    • Entity ID: Copy and paste the following:

      https://saml.salesforce.com

    • Click Save.

    • bmc_newd.png

  6. Still on the SAML Single Sign-On Settings page, copy your Login URL value:

    bmc_newe.png

  7. In Okta, select the Sign On tab for the BMC Remedyforce app, then click Edit.

    • Enter the Login URL value you made a copy of in step 6 above into the corresponding field.

    • Click Save:

    bmc_newf.png

  8. Done!


Notes

SP-initiated SSO

Navigate to your Salesforce Domain URL. You should see an option to login using your Identity Provider:

bmc_newg.png