Establishing single sign-on (SSO) between the portal installation and HCL Connections in SmartCloud for Social Business | HCL Digital Experience
Learn about the requirements that must be fulfilled in order to successfully integrate HCL Portal with HCL Connections in SmartCloud for Social Business. You can provide a user experience where a user logs in one time into HCL Portal and then automatically sees all integrated HCL Connections information.
Since SmartCloud for Social Business uses a specific user repository, the following
requirements are established by using Identity Federation and Security Assertion Markup
Language (SAML):
- Users do not have to maintain separate user names and passwords for HCL Portal and HCL Connections.
- A user logs on one time in to your digital experience and can view:
- Information from HCL Connections in SmartCloud for Social Business Rest APIs that are rendered by using portlets or HCL Web Content Manager rendering in HCL Portal.
- The SmartCloud for Social Business HCL Connections web user interface.
- The infrastructure to complete outbound calls must be configured to support SAML-based
single sign-on (SSO), since single sign-on needs to be established for calls from the
portal JVM to the HCL Connections server in SmartCloud for Social Business APIs.
To configure support for SAML-based single sign-on, you must use one of the following
identity providers:
- To use Tivoli Federated Identity Manager (TFIM) as your identity provider, view the information in Configuration settings for Tivoli Federated Identity Manager (TFIM) in the related links section.
- To use Active Directory Federation Services (ADFS) as your identity provider, view the information in Configuration settings for Active Directory Federation Services (ADFS) in the related links.
Notes:- SAML 2.0 is the only supported version.
- Active Directory Federation Services (ADFS) is supported beginning with CF05 and later.
The infrastructure for your integrated system is as follows:
- There is an identity provider server in your local environment that uses the same user repository as your portal server.
- SSO between your portal server and the local identity provider system is established.
- The local identity provider server and the SmartCloud for Social Business infrastructure trust each other.
- For general information, see Federated identity management in the related links.
- For specifics of enabling federated Identity Management, see Enabling federated identity management in the related links.