Follow this guide for integrating Salesforce with Forj Software (SAML 2.0)
Values Forj needs from Salesforce
Metadata URL
-
- Go to Setup > Apps > App Manager > Connected Apps
- Find the connected app you created for Forj
The metadata URL we need will be called “Metadata Discovery Endpoint” and will look like this: https://your-salesforce-domain.my.salesforce.com/.well-known/samlidp/Connected_App_Name.xml
SSO Target URl
-
-
- Go to Setup > Apps > App Manager > Connected Apps
- Find the connected app you created for Forj
- The SSO Target URI will be called “Idp-Initiated Login URL” and will look like this: https://your-salesforce-domain.my.salesforce.com/idp/login?app=1234xpr0000000QED
-
Certificate Fingerprint ID (SHA-1)
-
- Go to Setup > Identity Provider
- If no certificates exist there, you may need to click “Enable Identity Provider” to generate one
- Click the “download certificate” button
- Using a service like https://certificatedecoder.dev/, decode the certificate that your Salesforce Identity Provider uses.
- You’ll need the SHA-1 fingerprint value from the cert, and it will need to be formatted to look like the mask in the Certificate Fingerprint ID form field:
- Go to Setup > Identity Provider
Values Salesforce needs from Forj
Callback URL
-
- This will be your domain + some auth-related decorators, and will look like this:
- https://your-domain.mobilize.io/users/auth/saml/callback
- This will be your domain + some auth-related decorators, and will look like this:
Start URL
-
- This will be your community’s domain: https://your-domain.mobilize.io
Entity ID
-
- This will be your community’s domain with a specialized metadata path, and will look like this:
- https://your-domain.mobilize.io/users/auth/saml/metadata
- This will be your community’s domain with a specialized metadata path, and will look like this:
ACS URL
-
- This will be the same as the callback URL
Forj Community Setup
- Sign into your community as a community manager or account owner
- Navigate to Community Settings > Authentication
- Toggle the “Single Sign-On” feature on and select “SAML Configuration”
- Using the values you collected during step three of the previous section, fill out the following fields:
- Metadata Url (or IdP Entity Id)
- SSO Target URL
- Certificate Fingerprint ID (SHA-1)
Comments
0 comments
Article is closed for comments.