Appendix: Setting a trial account on Salesforce
Setting a trial account on Salesforce
To login to the Saleforce application, you must create a trial account. The sections below briefs about the process to create a trial account .
To setup a trial account
-
Login to the Salesforce developer edition link: https://developer.salesforce.com/signup?d=70130000000td6N.
- Provide the relevant details and click Sign me up.
A trial account is created and an instance is assigned.
- Switch the view to Saleforce classic view by clicking Switch to Salesforce Classic.
- Click the Setup tab.
- Click Build | Create | Apps.
- In the Connected Apps section, click New.
- In the Basic Information section, enter the relevant details.
- In the API (Enable OAuth Settings) section, select Enable OAuth Settings checkbox.
- Provide the url text https://app.getpostman.com/oauth2/callback in the Callback URL text field.
NOTE: This url must be used just to configure the trial account and not as a browsing link.
- From the Selected OAuth Scopes drop-down menu, select Access and manage your data(api).
- Click Save.
- From the API (Enabel OAuth Settings) section, retrieve the Consumer Key and Consumer Secret.
To generate a security token
A security token is sent to the registered email address. If not received, follow the below steps to generate a token.
-
On the home page, click My Settings.
- Click Personal | Reset My Security Token.
- Review the information displayed on the screen and click Reset Security Token.
- Provide the relevant information such as:
Registering the application, providing necessary permissions, retrieving Client Id and Client Secret from the Azure AD tenant
Registering the application, providing necessary permissions, retrieving Client Id and Client Secret from the Azure AD tenant
This section provides the details about registering the application, providing necessary permissions, retrieving Client Id and Client Secret from the Azure AD tenant, for both single tenant and multi-tenant connector configuration.
NOTE: Safeguard for Privileged Passwords only allows for a single tenant connector configuration..
To register application, provide appropriate permissions, retrieve client ID, and client secret from the Azure AD tenant
-
Login to Azure portal and select Azure Active Directory.
-
Select App registrations.
NOTE: For Safeguard for Privileged Passwords, the Azure AD application registration must be public.
- Click New registration and provide the necessary details.
Provide the following details:
- Application name
- Redirect URL: https://connect-supervisor.cloud.oneidentity.com/v1/consent.
- Select the created application and click View API Permissions.
- From API permission, add the required permissions for Microsoft Graph API (delegated and application permissions).
The registered application must have the following permissions:
- Directory.ReadWrite.All
- Group.ReadWrite.All
- User.ManageIdentities. All
- User.ReadWrite.All
-
Create a user under Azure Active Directory and assign Privileged role administrator role under the user's Assigned roles.
NOTE: A Global administrator would also be able to provide consent.
-
For the Azure Active Directory, assign User administrator role for the application created.
NOTE: For Safeguard for Privileged Passwords, you must assign at least the Helpdesk Administrator role for the application created, but should assign a higher role if you want to manage special accounts (for example, Billing Administrator or Global Administrator).
To assign User administrator role for the application created:
- Select Roles and administrators.
-
Click + Add Assignments, and search the name of the application created.
- Gather the following details from the corresponding pages of the application given in the table below.
Table 418: Application details
Details |
Page |
Application (client) ID
Azure Active Directory's Directory (tenant) ID |
Overview |
Client Secret |
Certificates & secrets |
More details on Azure AD
For more details on Azure AD, refer the following links:
Generating a private key for service account in GoToMeeting
Generating a private key for service account in GoToMeeting
A private key has to be generated to access the GoToMeeting service account.
Generating a private key
-
Create an account in GoToMeeting.
- Login to the GoTo Developer Center. For more information use the link here: https://goto-developer.logmeininc.com/.
- Click MyApp and create an application. Note the Consumer key and Consumer secret.
- Login to the GoToMeeting administrator portal to find the admin key in the URL.
Configuring Amazon S3 AWS connector to support entitlements for User and Group
Configuring Amazon S3 AWS connector to support entitlements for User and Group
This section gives the details of the configuration changes to be made to the Amazon (S3 and AWS) connector to support entitlements for User and Group. The Designer tool and the Synchronization Editor tool are used to configure the Amazon S3 AWS connector to support entitlements for User and Group.
For more information, see: