Use the default tenant signing certificate It’s not necessary to select this option-it’s present to display the current certificate in use. When selected the certificate currently in use is displayed. Select an option to change the signing certificate. Just be sure to use a matching certificate both in the application settings in the Admin Portal and in the application itself. These settings specify the signing certificate used for secure SSO authentication between the CyberArk Identity and the web application. If this web application is added only to provide SAML for a corresponding mobile app, deselect this option so the web application won’t display for users in the user portal. Select Show in User app list to display this web application in the user portal. The Application ID is case-sensitive and can be any combination of letters, numbers, spaces, and special characters up to 256 characters. There can only be one SAML application deployed with the name used by the mobile application. If you change the name of the web application that corresponds to the mobile application, you need to enter the original application name in the Application ID field. The Application ID has to be the same as the text string that is specified as the target in the code of the mobile application written using the mobile SDK. The CyberArk Identity uses the Application ID to provide single sign-on to mobile applications. On the Application Settings page, expand the Additional Options section and specify the following settings:Ĭonfigure this field if you are deploying a mobile application that uses the CyberArk mobile SDK. See CyberArk-issued derived credentials for more information. (Optional) On the Application Settings page, click Enable Derived Credentials for this app on enrolled devices (opens in built-in browser) to use derived credentials on enrolled mobile devices to authenticate with this application. Save this file so that you can access it when Configure Moxtra on its web site. See Choose a certificate file for the latest information.Ĭopy the following and save them so that you can access the values when Configure Moxtra on its web site: The description of how to choose and download a signing certificate in this document might differ slightly from your experience. You can specify an IP Range in the Admin Portal Policy page to restrict access to the application.Ĭonfigure Moxtra in the Admin Portal (Part 1) Resetting another user’s password requires administrator rights.Īccess restriction using a corporate IP range The following table lists features and functionality specific to Moxtra. What you need to know about MoxtraĮach SAML application is different. You also upload the public key certificate in a. p12 file to the application settings in the Admin Portal. If you use your own certificate, you upload the signing certificate and its private key in a. To establish a trusted connection between the web application and the CyberArk Identity, you need to have the same signing certificate in both the application and the application settings in the Admin Portal. You can either download one from the Admin Portal or use your organization’s trusted certificate. (Optional) Configure the Moxtra mobile application for single sign-on.īefore you configure the Moxtra web application for SSO, you need the following:Īn active Moxtra account with administrator rights for your organization. In the Admin Portal, finish configuring application settings.įor details, Configure Moxtra in the Admin Portal (Part 2).Īfter you have finished configuring the application settings in the Admin Portal and the Moxtra application, users are ready to launch the application from the CyberArk Identity User Portal. For details, Configure Moxtra on its web site You will need to copy some settings from Application Settings in the Admin Portal and paste them into fields on the Moxtra website. For details, see Configure Moxtra in the Admin Portal (Part 1).Ĭonfigure the Moxtra application for single sign-on. Once the application settings are configured, complete the user account mapping and assign the application to one or more roles. In the Admin Portal, add the application and configure application settings. Prepare Moxtra for single sign-on (see Moxtra requirements for SSO). SP-initiated SSO for Moxtra is automatically enabled when the SAML feature is activated.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |