Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Log in to the Infoblox SSO Portal at https://sso.infoblox.com/.
  2. On the 3rd Party IDP page of the Infoblox SSO Portal, go to the Map Groups section, click Configure Group Mapping.
  3. In the Map Groups dialog box, click Add, and then enter the IdP group name in the following text box:

    1. IDP USER GROUP: For OKTA federation.

    2. AZURE OBJECT ID: For Azure AD federation
    3. FORGEROCK GROUP NAME: For ForgeRock federation.

      Note
      titleNote

      Ensure that you enter the IdP group name you configured in your SAML application. You can find the IDP group name/ID at your IdP. Azure AD will only send the groups’ Azure Object ID in the SAML Assertion. Therefore, IDP group names are not used when federating with Azure AD.

      The following restrictions apply to the IdP group names:

      • The name cannot be empty.
      • The length must be less than or equal to 253 characters.
      • Valid characters include the following: a-z, A-Z, 0-9, -, .
      • Must begin with an alphanumeric character.
      • Must end with an alphanumeric character.
        If your IdP group names do not meet the above restrictions, you will receive an error when you try to add the group mapping entries.
  4. From the BloxOne USER GROUP drop-down list, choose the desired BLOXONE User Group to map to the entered IdP user group. You can also use the search option by entering the name of the BloxOne user group to find a match. Repeat this process for each IdP group as necessary to create multiple mappings. You can map multiple IdP groups to a single BloxOne user group.
    For example, if you map an IdP user group "idp-group" to a BloxOne user group "ib-ddi-admin," any user who signs in to the Cloud Services Portal and belongs to the "idp-group" will automatically be added to the "ib-ddi-admin" group.
  5. Click Save & Close to save the mappings.
  6. After you have configured the SAML application and mapped user groups, you can complete the following configuration:
    1. Testing 3rd Party IdP Authentication
    2. Activating 3rd Party IdP Authentication

    You can also perform the following after you set up 3rd party IdP authentication: