orchestrator
2020.10
false
- Getting started
- Best practices
- Tenant
- Actions
- Folders Context
- Automations
- Processes
- Jobs
- Triggers
- Logs
- Monitoring
- Queues
- Assets
- Storage Buckets
- Test Suite - Orchestrator
- Action Catalogs
- Profile
- System Administrator
- Identity Server
- Authentication
- Other Configurations
- Integrations
- Classic Robots
- Troubleshooting

OUT OF SUPPORT
Orchestrator User Guide
Last updated Dec 12, 2023
Self-Signed Certificates
linkSelf-signed certificates are a way to secure your data by encrypting the SAML response when using single-sign on authentication. Below you can find an example of generating and using self-signed certificates in OKTA.
Generating a Self-Signed Certificate
linkThere are multiple software applications which allow you to generate self-signed certificates, such as OpenSSL, MakeCert, IIS, Pluralsight or SelfSSL. For this example, we use MakeCert. In order to make a self-signed certificate with a private key, run the following commands from the Command Prompt:
makecert -r -pe -n “CN=UiPath” -e 01/01/2019 -sky exchange -sv makecert.pvk makecert.cer
C:\Program Files (x86)\Microsoft SDKs\Windows\v7.1A\Bin\pvk2pfx.exe” -pvk makecert.pvk -spc makecert.cer -pfx makecert.pfx
Add the Certificate to OKTA
link- Login to OKTA. The following setup is made in Classic UI view. You can change it from the drop-down on the top-right corner of the window.
- On the Application tab, select your previously defined application.
- On the General tab, in the SAML Settings section, click Edit.
- On the Configure SAML tab, click Show Advanced Settings.
- For the Assertion Encryption drop-down, select the Encrypted option.
- The certificate is displayed in the Encryption Certificate field.
Set Orchestrator/Identity Server to Use the Certificate
link- Import the makecert.pfx certificate to the Windows certificate store using Microsoft Management Console. See here how to do that.
- Make sure that the following configuration is present in Identity Server's SAML2 settings within the External Providers page (read here how to access Identity Server):
- In the Signing Certificate section, set Store name parameter to
My
from the drop-box. - Set the Store locationparameter to
LocalMachine
. -
Set the Thumbprint parameter to the thumbprint value provided in the Windows certificate store. Details here.
- In the Signing Certificate section, set Store name parameter to
- Click Save to save the changes to the external identity provider settings.
- Restart the IIS server after performing any configuration changes within Identity Server.