From 129d2b81175cc61d45cdd00753c350c7ad5b8f73 Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 16:06:35 +0000
Subject: [PATCH 01/11] Create index.md
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
.../services/aruba-orchestrator/index.md | 37 +++++++++++++++++++
1 file changed, 37 insertions(+)
create mode 100644 website/integrations/services/aruba-orchestrator/index.md
diff --git a/website/integrations/services/aruba-orchestrator/index.md b/website/integrations/services/aruba-orchestrator/index.md
new file mode 100644
index 000000000000..f79b31242c75
--- /dev/null
+++ b/website/integrations/services/aruba-orchestrator/index.md
@@ -0,0 +1,37 @@
+---
+title: Integrate with Service Name
+sidebar_label: Service Name
+---
+
+# Service Name
+
+Support level: Community
+
+## What is Service-Name
+
+> Insert a quick overview of what Service Name is and what it does. Simply describe the product and what it is, how it is used, and do not include marketing or sales-oriented content.
+>
+> -- https://service.xyz
+
+## Preparation
+
+The following placeholders will be used:
+
+- `service.company` is the FQDN of the Service install. (Remove this for SaaS)
+- `authentik.company` is the FQDN of the authentik install.
+
+## Service configuration
+
+Insert Service configuration
+
+1. Write first step here...
+
+2. Continue with steps....
+
+## authentik configuration
+
+Insert authentik configuration
+
+1. Write first step here...
+
+2. Continue with steps....
From e154633a166a0e25dcaa55be94d047aed580b42d Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 16:14:20 +0000
Subject: [PATCH 02/11] Delete website/integrations/services/aruba-orchestrator
directory
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
.../services/aruba-orchestrator/index.md | 37 -------------------
1 file changed, 37 deletions(-)
delete mode 100644 website/integrations/services/aruba-orchestrator/index.md
diff --git a/website/integrations/services/aruba-orchestrator/index.md b/website/integrations/services/aruba-orchestrator/index.md
deleted file mode 100644
index f79b31242c75..000000000000
--- a/website/integrations/services/aruba-orchestrator/index.md
+++ /dev/null
@@ -1,37 +0,0 @@
----
-title: Integrate with Service Name
-sidebar_label: Service Name
----
-
-# Service Name
-
-Support level: Community
-
-## What is Service-Name
-
-> Insert a quick overview of what Service Name is and what it does. Simply describe the product and what it is, how it is used, and do not include marketing or sales-oriented content.
->
-> -- https://service.xyz
-
-## Preparation
-
-The following placeholders will be used:
-
-- `service.company` is the FQDN of the Service install. (Remove this for SaaS)
-- `authentik.company` is the FQDN of the authentik install.
-
-## Service configuration
-
-Insert Service configuration
-
-1. Write first step here...
-
-2. Continue with steps....
-
-## authentik configuration
-
-Insert authentik configuration
-
-1. Write first step here...
-
-2. Continue with steps....
From c7fa82b8adf121e7b9d7e89d5e2a592c3a96301b Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 16:14:43 +0000
Subject: [PATCH 03/11] Create index.md
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
website/integrations/services/Aruba-Orchestrator/index.md | 1 +
1 file changed, 1 insertion(+)
create mode 100644 website/integrations/services/Aruba-Orchestrator/index.md
diff --git a/website/integrations/services/Aruba-Orchestrator/index.md b/website/integrations/services/Aruba-Orchestrator/index.md
new file mode 100644
index 000000000000..8b137891791f
--- /dev/null
+++ b/website/integrations/services/Aruba-Orchestrator/index.md
@@ -0,0 +1 @@
+
From 3146fdb048b7aef03242c469b5dc97f8acf864ea Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 17:00:12 +0000
Subject: [PATCH 04/11] Update index.md
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
.../services/Aruba-Orchestrator/index.md | 78 +++++++++++++++++++
1 file changed, 78 insertions(+)
diff --git a/website/integrations/services/Aruba-Orchestrator/index.md b/website/integrations/services/Aruba-Orchestrator/index.md
index 8b137891791f..ee28920d8873 100644
--- a/website/integrations/services/Aruba-Orchestrator/index.md
+++ b/website/integrations/services/Aruba-Orchestrator/index.md
@@ -1 +1,79 @@
+---
+title: Integrate with Aruba Orchestrator
+sidebar_label: Aruba Orchestrator
+---
+
+# Service Name
+
+Support level: Community
+
+## What is Service-Name
+
+> Aruba Orchestrator is a network management platform used to centrally manage, configure, monitor, and automate Aruba network devices and services. It provides tools for network visibility, policy management, and performance monitoring, simplifying the administration of complex and distributed network environments.
+>
+> -- https://www.hpe.com/us/en/aruba-edgeconnect-sd-wan.html
+
+## Preparation
+
+The following placeholders will be used:
+
+- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install.
+- `authentik.company` is the FQDN of the authentik install.
+- `ssl.certificate` is the name of the SSL certificate used to sign outgoing responses.
+
+## authentik Configuration
+
+Insert Service configuration
+
+1. Log in to authentik as an admin, and go to the Admin interface.
+2. Create a new SAML Property Mapping under **Customisation** -> **Property Mappings**:
+ - **Name**: Aruba Orchestrator RBAC
+ - **SAML Attribute Name**: sp-roles
+ - **Expression**: Use the expression below but amend the group name as desired.
+ `if ak_is_group_member(request.user, name="authentik Admins"):
+ result = "superAdmin"
+return result`
+ - Save settings
+
+3. Create a new SAML Provider under **Applications** -> **Providers** using the following settings:
+ - **Name**: Aruba Orchestrator
+ - **Authentication Flow**: default-authentication-flow (Welcome to authentik!)
+ - **Authorization Flow ID**: default-provider-authorization-explicit-consent (Authorize Application)
+ - Protocol settings:
+ - - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+ - - **Issuer**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+
+ - - **Service Provider Binding**: Post
+ - Advanced protocol settings:
+ - - **Signing Certificate **:ssl.certificate
+ - - **Property Mappings **:default + sp-roles
+ - Leave everything else as default and save settings
+4. Download the signing certificate under **Applications** -> **Providers** -> **Aruba Orchestrator**
+5. Create a new application under **Applications** -> **Applications**, pick a name and a slug, and assign the provider that you have just created.
+
+## Aruba Orchestrator Configuration
+
+1. Log into the Aruba Orchestrator
+2. Create a new Remote Authentication Server under **Orchestrator** -> **Authentication** -> **Add New Server**
+ - **Type**: SAML
+ - **Name**: Authentik
+ - **Username Attribute**: http://schemas.goauthentik.io/2021/02/saml/username
+ - **Issuer URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+ - **SSO Endpoint**: https://authentik.company/application/saml/sporch/sso/binding/init/
+ - **IdP X509 Cert**: (paste in the downloaded signing certificate)
+ - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+ - **EdgeConnect SLO Endpoint**: https://arubaorchestrator.company/gms/rest/authentication/saml2/logout
+ - **iDP SLO Endpoint**: (optional)
+ - **EdgeConnect X.509 Cert SLO**: (optional)
+ - **Roles Attribute**: sp-roles (optional)
+ - **Appliance Access Group Attribute**: (optional)
+ - **Default role**: (optional)
+
+## Verification
+
+1. Go to `https://arubaorchestrator.company` using Incognito mode.
+2. Click **Log In Using Authentik** on the login screen.
+3. Authorize with authentik.
+4. You will be redirected to home screen of the Aruba Orchestrator.
+
From 7b24ec837b170951a99a8fc908db98859f2ce0b6 Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 17:00:54 +0000
Subject: [PATCH 05/11] Update index.md
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
website/integrations/services/Aruba-Orchestrator/index.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/website/integrations/services/Aruba-Orchestrator/index.md b/website/integrations/services/Aruba-Orchestrator/index.md
index ee28920d8873..05c1dfeb958d 100644
--- a/website/integrations/services/Aruba-Orchestrator/index.md
+++ b/website/integrations/services/Aruba-Orchestrator/index.md
@@ -7,7 +7,7 @@ sidebar_label: Aruba Orchestrator
Support level: Community
-## What is Service-Name
+## What is Aruba Orchestrator
> Aruba Orchestrator is a network management platform used to centrally manage, configure, monitor, and automate Aruba network devices and services. It provides tools for network visibility, policy management, and performance monitoring, simplifying the administration of complex and distributed network environments.
>
From 440da1e1c436c7f03c4fa78f4f2de83a7bfe2a7e Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 17:04:20 +0000
Subject: [PATCH 06/11] Added Aruba Orchestrator
Added the Aruba Orchestrator to the integrations section of the website.
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
website/integrations/services/Aruba-Orchestrator/index.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/website/integrations/services/Aruba-Orchestrator/index.md b/website/integrations/services/Aruba-Orchestrator/index.md
index 05c1dfeb958d..4e13eefeebc4 100644
--- a/website/integrations/services/Aruba-Orchestrator/index.md
+++ b/website/integrations/services/Aruba-Orchestrator/index.md
@@ -74,6 +74,6 @@ return result`
1. Go to `https://arubaorchestrator.company` using Incognito mode.
2. Click **Log In Using Authentik** on the login screen.
3. Authorize with authentik.
-4. You will be redirected to home screen of the Aruba Orchestrator.
+4. You will be redirected to the home screen of the Aruba Orchestrator.
From e0ca85a0c4091f84558ef53094cf654dae57d90b Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 17:08:55 +0000
Subject: [PATCH 07/11] Delete website/integrations/services/Aruba-Orchestrator
directory
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
.../services/Aruba-Orchestrator/index.md | 79 -------------------
1 file changed, 79 deletions(-)
delete mode 100644 website/integrations/services/Aruba-Orchestrator/index.md
diff --git a/website/integrations/services/Aruba-Orchestrator/index.md b/website/integrations/services/Aruba-Orchestrator/index.md
deleted file mode 100644
index 4e13eefeebc4..000000000000
--- a/website/integrations/services/Aruba-Orchestrator/index.md
+++ /dev/null
@@ -1,79 +0,0 @@
----
-title: Integrate with Aruba Orchestrator
-sidebar_label: Aruba Orchestrator
----
-
-# Service Name
-
-Support level: Community
-
-## What is Aruba Orchestrator
-
-> Aruba Orchestrator is a network management platform used to centrally manage, configure, monitor, and automate Aruba network devices and services. It provides tools for network visibility, policy management, and performance monitoring, simplifying the administration of complex and distributed network environments.
->
-> -- https://www.hpe.com/us/en/aruba-edgeconnect-sd-wan.html
-
-## Preparation
-
-The following placeholders will be used:
-
-- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install.
-- `authentik.company` is the FQDN of the authentik install.
-- `ssl.certificate` is the name of the SSL certificate used to sign outgoing responses.
-
-## authentik Configuration
-
-Insert Service configuration
-
-1. Log in to authentik as an admin, and go to the Admin interface.
-2. Create a new SAML Property Mapping under **Customisation** -> **Property Mappings**:
- - **Name**: Aruba Orchestrator RBAC
- - **SAML Attribute Name**: sp-roles
- - **Expression**: Use the expression below but amend the group name as desired.
- `if ak_is_group_member(request.user, name="authentik Admins"):
- result = "superAdmin"
-return result`
- - Save settings
-
-3. Create a new SAML Provider under **Applications** -> **Providers** using the following settings:
- - **Name**: Aruba Orchestrator
- - **Authentication Flow**: default-authentication-flow (Welcome to authentik!)
- - **Authorization Flow ID**: default-provider-authorization-explicit-consent (Authorize Application)
- - Protocol settings:
- - - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
- - - **Issuer**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
-
- - - **Service Provider Binding**: Post
- - Advanced protocol settings:
- - - **Signing Certificate **:ssl.certificate
- - - **Property Mappings **:default + sp-roles
- - Leave everything else as default and save settings
-4. Download the signing certificate under **Applications** -> **Providers** -> **Aruba Orchestrator**
-5. Create a new application under **Applications** -> **Applications**, pick a name and a slug, and assign the provider that you have just created.
-
-## Aruba Orchestrator Configuration
-
-1. Log into the Aruba Orchestrator
-2. Create a new Remote Authentication Server under **Orchestrator** -> **Authentication** -> **Add New Server**
- - **Type**: SAML
- - **Name**: Authentik
- - **Username Attribute**: http://schemas.goauthentik.io/2021/02/saml/username
- - **Issuer URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
- - **SSO Endpoint**: https://authentik.company/application/saml/sporch/sso/binding/init/
- - **IdP X509 Cert**: (paste in the downloaded signing certificate)
- - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
- - **EdgeConnect SLO Endpoint**: https://arubaorchestrator.company/gms/rest/authentication/saml2/logout
- - **iDP SLO Endpoint**: (optional)
- - **EdgeConnect X.509 Cert SLO**: (optional)
- - **Roles Attribute**: sp-roles (optional)
- - **Appliance Access Group Attribute**: (optional)
- - **Default role**: (optional)
-
-## Verification
-
-1. Go to `https://arubaorchestrator.company` using Incognito mode.
-2. Click **Log In Using Authentik** on the login screen.
-3. Authorize with authentik.
-4. You will be redirected to the home screen of the Aruba Orchestrator.
-
-
From 2208b926b2c74a3c98504c8ce02f8a659ae17ce9 Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 17:09:31 +0000
Subject: [PATCH 08/11] Create index.md
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
.../services/aruba-orchestrator/index.md | 77 +++++++++++++++++++
1 file changed, 77 insertions(+)
create mode 100644 website/integrations/services/aruba-orchestrator/index.md
diff --git a/website/integrations/services/aruba-orchestrator/index.md b/website/integrations/services/aruba-orchestrator/index.md
new file mode 100644
index 000000000000..a832bc74f533
--- /dev/null
+++ b/website/integrations/services/aruba-orchestrator/index.md
@@ -0,0 +1,77 @@
+---
+title: Integrate with Aruba Orchestrator
+sidebar_label: Aruba Orchestrator
+---
+
+# Service Name
+
+Support level: Community
+
+## What is Aruba Orchestrator
+
+> Aruba Orchestrator is a network management platform used to centrally manage, configure, monitor, and automate Aruba network devices and services. It provides tools for network visibility, policy management, and performance monitoring, simplifying the administration of complex and distributed network environments.
+>
+> -- https://www.hpe.com/us/en/aruba-edgeconnect-sd-wan.html
+
+## Preparation
+
+The following placeholders will be used:
+
+- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install.
+- `authentik.company` is the FQDN of the authentik install.
+- `ssl.certificate` is the name of the SSL certificate used to sign outgoing responses.
+
+## authentik Configuration
+
+Insert Service configuration
+
+1. Log in to authentik as an admin, and go to the Admin interface.
+2. Create a new SAML Property Mapping under **Customisation** -> **Property Mappings**:
+ - **Name**: Aruba Orchestrator RBAC
+ - **SAML Attribute Name**: sp-roles
+ - **Expression**: Use the expression below but amend the group name as desired.
+ `if ak_is_group_member(request.user, name="authentik Admins"):
+ result = "superAdmin"
+return result`
+ - Save settings
+
+3. Create a new SAML Provider under **Applications** -> **Providers** using the following settings:
+ - **Name**: Aruba Orchestrator
+ - **Authentication Flow**: default-authentication-flow (Welcome to authentik!)
+ - **Authorization Flow ID**: default-provider-authorization-explicit-consent (Authorize Application)
+ - Protocol settings:
+ - - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+ - - **Issuer**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+
+ - - **Service Provider Binding**: Post
+ - Advanced protocol settings:
+ - - **Signing Certificate **:ssl.certificate
+ - - **Property Mappings **:default + sp-roles
+ - Leave everything else as default and save settings
+4. Download the signing certificate under **Applications** -> **Providers** -> **Aruba Orchestrator**
+5. Create a new application under **Applications** -> **Applications**, pick a name and a slug, and assign the provider that you have just created.
+
+## Aruba Orchestrator Configuration
+
+1. Log into the Aruba Orchestrator
+2. Create a new Remote Authentication Server under **Orchestrator** -> **Authentication** -> **Add New Server**
+ - **Type**: SAML
+ - **Name**: Authentik
+ - **Username Attribute**: http://schemas.goauthentik.io/2021/02/saml/username
+ - **Issuer URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+ - **SSO Endpoint**: https://authentik.company/application/saml/sporch/sso/binding/init/
+ - **IdP X509 Cert**: (paste in the downloaded signing certificate)
+ - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
+ - **EdgeConnect SLO Endpoint**: https://arubaorchestrator.company/gms/rest/authentication/saml2/logout
+ - **iDP SLO Endpoint**: (optional)
+ - **EdgeConnect X.509 Cert SLO**: (optional)
+ - **Roles Attribute**: sp-roles (optional)
+ - **Appliance Access Group Attribute**: (optional)
+ - **Default role**: (optional)
+
+## Verification
+
+1. Go to `https://arubaorchestrator.company` using Incognito mode.
+2. Click **Log In Using Authentik** on the login screen.
+3. Authorize with authentik.
+4. You will be redirected to the home screen of the Aruba Orchestrator.
From 4243a333764badfd24cdfc2ed450a98242044ca5 Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 17:18:01 +0000
Subject: [PATCH 09/11] Update sidebarsIntegrations.js
Added Aruba Orchestrator to the sidebar.
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
website/sidebarsIntegrations.js | 1 +
1 file changed, 1 insertion(+)
diff --git a/website/sidebarsIntegrations.js b/website/sidebarsIntegrations.js
index 39d1c0dca54d..840e1481a098 100644
--- a/website/sidebarsIntegrations.js
+++ b/website/sidebarsIntegrations.js
@@ -102,6 +102,7 @@ module.exports = {
type: "category",
label: "Networking",
items: [
+ "services/aruba-orchestrator/index",
"services/firezone/index",
"services/fortigate-admin/index",
"services/fortigate-ssl/index",
From a3dc19949860689c94f586b401945dcfface414a Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 22:31:59 +0000
Subject: [PATCH 10/11] Update index.md (#2)
New Aruba Orchestrator Integration v2
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
.../services/aruba-orchestrator/index.md | 53 +++++++++----------
1 file changed, 25 insertions(+), 28 deletions(-)
diff --git a/website/integrations/services/aruba-orchestrator/index.md b/website/integrations/services/aruba-orchestrator/index.md
index a832bc74f533..a4e218d4e187 100644
--- a/website/integrations/services/aruba-orchestrator/index.md
+++ b/website/integrations/services/aruba-orchestrator/index.md
@@ -3,7 +3,7 @@ title: Integrate with Aruba Orchestrator
sidebar_label: Aruba Orchestrator
---
-# Service Name
+# Aruba Orchestrator
Support level: Community
@@ -23,30 +23,28 @@ The following placeholders will be used:
## authentik Configuration
-Insert Service configuration
-
1. Log in to authentik as an admin, and go to the Admin interface.
2. Create a new SAML Property Mapping under **Customisation** -> **Property Mappings**:
- - **Name**: Aruba Orchestrator RBAC
- - **SAML Attribute Name**: sp-roles
+
+ - **Name**: `Aruba Orchestrator RBAC`
+ - **SAML Attribute Name**: `sp-roles`
- **Expression**: Use the expression below but amend the group name as desired.
- `if ak_is_group_member(request.user, name="authentik Admins"):
- result = "superAdmin"
-return result`
- - Save settings
+ > if ak_is_group_member(request.user, name="authentik Admins"):
+ > result = "superAdmin"
+ > return result
+ - Save settings
3. Create a new SAML Provider under **Applications** -> **Providers** using the following settings:
- **Name**: Aruba Orchestrator
- - **Authentication Flow**: default-authentication-flow (Welcome to authentik!)
- - **Authorization Flow ID**: default-provider-authorization-explicit-consent (Authorize Application)
+ - **Authentication Flow**: `default-authentication-flow (Welcome to authentik!)`
+ - **Authorization Flow ID**: `default-provider-authorization-explicit-consent (Authorize Application)`
- Protocol settings:
- - - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
- - - **Issuer**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
-
+ - - **ACS URL**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/consume`
+ - - **Issuer**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/consume`
- - **Service Provider Binding**: Post
- Advanced protocol settings:
- - - **Signing Certificate **:ssl.certificate
- - - **Property Mappings **:default + sp-roles
+ - - **Signing Certificate**:`ssl.certificate`
+ - - **Property Mappings**:`default` + `sp-roles`
- Leave everything else as default and save settings
4. Download the signing certificate under **Applications** -> **Providers** -> **Aruba Orchestrator**
5. Create a new application under **Applications** -> **Applications**, pick a name and a slug, and assign the provider that you have just created.
@@ -55,23 +53,22 @@ return result`
1. Log into the Aruba Orchestrator
2. Create a new Remote Authentication Server under **Orchestrator** -> **Authentication** -> **Add New Server**
- - **Type**: SAML
- - **Name**: Authentik
- - **Username Attribute**: http://schemas.goauthentik.io/2021/02/saml/username
- - **Issuer URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
- - **SSO Endpoint**: https://authentik.company/application/saml/sporch/sso/binding/init/
+ - **Type**: `SAML`
+ - **Name**: `authentik`
+ - **Username Attribute**: `http://schemas.goauthentik.io/2021/02/saml/username`
+ - **Issuer URL**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/consume`
+ - **SSO Endpoint**: `https://authentik.company/application/saml//sso/binding/init/` (replace with application slug name)
- **IdP X509 Cert**: (paste in the downloaded signing certificate)
- - **ACS URL**: https://arubaorchestrator.company/gms/rest/authentication/saml2/consume
- - **EdgeConnect SLO Endpoint**: https://arubaorchestrator.company/gms/rest/authentication/saml2/logout
+ - **ACS URL**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/consume`
+ - **EdgeConnect SLO Endpoint**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/logout`
- **iDP SLO Endpoint**: (optional)
- **EdgeConnect X.509 Cert SLO**: (optional)
- - **Roles Attribute**: sp-roles (optional)
+ - **Roles Attribute**: `sp-roles` (optional)
- **Appliance Access Group Attribute**: (optional)
- **Default role**: (optional)
## Verification
-1. Go to `https://arubaorchestrator.company` using Incognito mode.
-2. Click **Log In Using Authentik** on the login screen.
-3. Authorize with authentik.
-4. You will be redirected to the home screen of the Aruba Orchestrator.
+1. Go to `https://arubaorchestrator.company`
+2. Click **Log In Using authentik** on the login screen and authorize with authentik.
+3. You will be redirected to the home screen of the Aruba Orchestrator.
From f152fef10855657d7bd848c1b1470a2f8155f76f Mon Sep 17 00:00:00 2001
From: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
Date: Thu, 14 Nov 2024 22:42:15 +0000
Subject: [PATCH 11/11] Added Aruba Orchestrator v3 (#3)
had a \ character which was failing build.
Signed-off-by: jazzyj123 <76889039+jazzyj123@users.noreply.github.com>
---
website/integrations/services/aruba-orchestrator/index.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/website/integrations/services/aruba-orchestrator/index.md b/website/integrations/services/aruba-orchestrator/index.md
index a4e218d4e187..32e090a5ec74 100644
--- a/website/integrations/services/aruba-orchestrator/index.md
+++ b/website/integrations/services/aruba-orchestrator/index.md
@@ -57,7 +57,7 @@ The following placeholders will be used:
- **Name**: `authentik`
- **Username Attribute**: `http://schemas.goauthentik.io/2021/02/saml/username`
- **Issuer URL**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/consume`
- - **SSO Endpoint**: `https://authentik.company/application/saml//sso/binding/init/` (replace with application slug name)
+ - **SSO Endpoint**: `https://authentik.company/application/saml//sso/binding/init/` (replace \ with application slug name)
- **IdP X509 Cert**: (paste in the downloaded signing certificate)
- **ACS URL**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/consume`
- **EdgeConnect SLO Endpoint**: `https://arubaorchestrator.company/gms/rest/authentication/saml2/logout`