orchestrator
2021.10
false
- Getting started
- Best practices
- Tenant
- Folders Context
- Automations
- Processes
- Jobs
- Triggers
- Logs
- Monitoring
- Queues
- Assets
- Storage Buckets
- Test Suite - Orchestrator
- Other Configurations
- Integrations
- Classic Robots
- Host administration
- About the host level
- Managing system administrators
- Managing tenants
- Configuring system email notifications
- Audit logs for the host portal
- Maintenance Mode
- Organization administration
- Troubleshooting

OUT OF SUPPORT
Orchestrator User Guide
Last updated Oct 31, 2024
Google Authentication
linkConfigure Google to Recognize a New Orchestrator Instance
linkNote: The below steps are valid for Google SSO setup. Please note that the below procedure is a broad description of a sample configuration. For a fully detailed how-to, visit the official Google documentation.
If you do not have the necessary permissions, address to your system administrator in this regard. Make sure that the following service details are set into place:
- The service must be set as ON for everyone.
- The following mappings must be provided for Orchestrator attributes on the Attribute Mapping window:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
-
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn
- The following details must be provided on the Service Provider window:
https://orchestratorURL/identity/Saml2/Acs
as the ACS URLhttps://orchestratorURL/identity
as the Entity ID
Set Orchestrator/Identity Server to Use Google Authentication
link- Define a user in Orchestrator and have a valid email address set on the Users page.
- Import the signing certificate provided by the Identity Provider to the Windows certificate store using Microsoft Management Console.
- Log in to the Management portal as a system administrator.
- Go to Users and select the Security Settings tab.
-
In the External Providers section, click Configure under SAML 2.0:
The Configure SAML 2.0 panel opens at the right of the window.
-
Set it up as follows:
- Select the Enabled check box.
- Set the Service Provider Entity ID parameter to
https://orchestratorURL/identity
. - Set the Identity Provider Entity ID parameter to the value obtained by configuring Google authentication.
- Set the Single Sign-On Service URL parameter to the value obtained by configuring Google authentication.
- Select the Allow unsolicited authentication response checkbox.
- Set the Return URL parameter to
https://orchestratorURL/identity/externalidentity/saml2redirectcallback
. - Set the External user mapping strategy parameter to
By user email
. - Set the SAML binding type parameter to
HTTP redirect
. - In the Signing Certificate section, set Store name parameter to
My
from the drop-box. - Set the Store locationparameter to
LocalMachine
. -
Set the Thumbprint parameter to the thumbprint value provided in the Windows certificate store. Details here .
Note:Replace all occurrences ofhttps://orchestratorURL
with the URL of your Orchestrator instance.Make sure that the URL of the Orchestrator instance does not contain a trailing slash. Always fill it in ashttps://orchestratorURL/identity
, nothttps://ochestratorURL/identity/
.
- Click Save to save the changes to the external identity provider settings.
- Restart the IIS server.