Deployment

You must prepare the application before deploying the global package.

All the dependent packages must be deployed on the target tenant before proceeding with the global package deployment.

Global package parameters

The are certain resources that can be imported into a target tenant that require additional information during a package deployment. The additional resource parameters need to be set during the import.

These Security resources configurations are tenant-specific and they require parameter input to be set during the package deployment:

  • SAML service provider
  • WS-FED service provider
  • OIDC service provider
  • Federated Security
  • WS-Trust
  • Okta Active Mode
  • Azure AD Active Mode
  • DUO MFA provider
  • RSA MFA provider

SAML service provider parameters

Parameter name Description Required
Display Name The user-friendly name given to the service provider. Yes
Entity ID The entity ID is the unique identifier for the service provider in the SAML 2.0 protocol. Yes
SSO Endpoint The URL where the service provider receives the Single Sign On response from the federation hub as part of the SAML 2.0 protocol. Yes
SLO Endpoint The URL where the service provider receives the Single Log Out request from the federation hub as part of the SAML 2.0 protocol. Yes
Primary Signing Certificate The certificate used by the service provider to sign the Single Log Out response. Only sha-256 certificates are accepted. Yes
Secondary Signing Certificate The alternate certificate used by the service provider to sign the Single Log Out response. No

WS-FED service provider parameters

Parameter name Description Required
Display Name The user-friendly name given to the service provider. Yes
Entity ID The entity ID is the unique identifier for the service provider in the WS-Federation protocol. Yes
SSO Endpoint The URL where the federation hub issues the assertion, as a part of the WS-Federation protocol. Yes

Federated identity parameters

Parameter name Description Required
Display Name Name displayed to users during the sign-in process if you allow users to select their own authentication method on the Authentication URL Options page. Yes
Display Icon Icon displayed to users during the sign-in process if you allow users to select their own authentication method on the Authentication URL Options page. No
IDP Issuer The issuer of entityId Yes
Identity Provider Primary Certificate (Base64-encoded) The encrypting certificate public key of the service provider. Yes
Assertion Consumer Service Url The endpoint of the assertion consumer service. Yes
Single Logoff Service Url The endpoint of the Identity Providers single log off service. Yes

WS-Trust identity provider parameters

Parameter name Description Required
STS Name The Security Token Services name of the STS provider Yes
Service Endpoint The service endpoint of the STS provider Yes

Okta Active Mode identity provider parameters

Parameter name Description Required
Okta Domain URL The host name for the Okta API Yes
Valid Response Status

The only Okta API responses that IFS will accept. The recommended value is SUCCESS.

If there are more accepted status values, these can be entered as comma separated values.

Yes
Okta Profile Property The attribute from the Okta response that must be validated against the IFS database. This field is validated against the IFS user lookup field property. The recommended value is the login. Yes
Okta API Token This is the API token generated in Okta. The Okta API token is required only if the Okta Profile Property is not set to the login. No

Azure AD Active Mode identity provider parameters

Parameter name Description Required
Axure AD Token Endpoint The Azure AD token endpoint. Yes
Client ID The client ID generated from the identity provider Yes
Client Secret The client secret generated from the identify provider. Yes
Lookup Value This specifies which value from the IFS user definition is being used to identify the user. This field is validated against the Look Up Value property. Yes

OIDC identity provider parameters

Parameter name Description Required
Display Name The user-friendly name given to the service provider Yes
Display Icon Icon displayed to users during the sign-in process if you allow users to select their own authentication method on the Authentication URL Options page. No
IDP Issuer The issuer of entityId Yes
Client ID The client ID generated from the Identify provider Yes
Client Secret The client secret generated from the Identify provide. Yes
Authorization Endpoint The authorization endpoint of the OpenID provider for Infor OS to request for a code as part of the OIDC flow. Yes
Token Endpoint The endpoint of the OpenID provider to obtain an ID token and access token Yes
JWKS URI The endpoint that retrieves the keys to validate the signature of the ID token. Yes
User Info Endpoint The endpoint is called by Infor OS to retrieve the user profile information. No
End Session Endpoint The endpoint to be called for logging out the user from the identity provider No

Duo MFA provider parameters

Parameter name Description Required
DUO Integration Key The integration key from the DUO account Yes
DUO Secret Key The secret key from the DUO account Yes
API Hostname The API hostname for the DUO account Yes

RSA MFA provider parameters

Parameter name Description Required
Client Key The client key for the RSA MFA provider Yes
Hostname The hostname for the RSA MFA provider Yes