Kapost
Before You Begin
Introduction
This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Kapost using SAML.
About Kapost
Kapost is a content marketing software platform, and it offers solutions for organizing content marketing into a structured business process.
After integrating Kapost with Oracle Identity Cloud Service:
- Users can access Kapost using their Oracle Identity Cloud Service login credentials.
- Users can start Kapost using the Oracle Identity Cloud Service My Apps console.
- Admins can assign and revoke user access to the Kapost app using the Oracle Identity Cloud Service administration console.
What Do You Need?
- An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
- A Kapost account with authorization rights to configure federated authentication.
Configuring the Kapost App in Oracle Identity Cloud Service
Use this section to register and activate the Kapost app, and then assign users to the app.
Prerequisite Step
A dedicated domain name is required before you can register and activate the Kapost app.
The Kapost domain name appears in the Kapost login URL: https://<Domain_Name>.kapost.com/
that you received in an email from Kapost.
Registering and Activating the Kapost App
Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.
Click App Catalog.
Search for
Kapost
, and then click Add.In the App Details section, enter your Kapost Domain Name, and then click Next.
Tip: This is the domain name value that you obtained in the "Prerequisite Step" section.
Click Download Signing Certificate.
Tip: Use this file later during the Kapost configuration in the "Configuring SSO for Kapost" section.
Click Finish. Oracle Identity Cloud Service displays a confirmation message.
Click Activate, and then click Activate Application. The Oracle Identity Cloud Service displays a confirmation message.
Assigning Users to the Kapost App
On the Kapost app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.
Select users that you want to assign to Kapost, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Kapost app is assigned to the users that you selected.
Configuring SSO for Kapost
Access Kapost as an administrator using the URL:
https://<Domain_Name>.kapost.com/
. The Kapost home page appears.In the left navigation menu, locate and hover over the Settings icon, and then select Single Sign-On. The Single Sign-On page appears.
Use the table to update the federated authentication attributes, and then click Save Changes.
This table lists the mandatory federated authentication attributes that you must set to complete the SSO configuration. Attribute Value Enable sso Select the check box. Autocreate users Select the check box to enable Just-In-Time provisioning. When selected, Kapost can be accessed by a user who is assigned to the Kapost app in Oracle Identity Cloud Service, even if the user does not have a Kapost account. Tip: Clear the selection to disable Just-In-Time provisioning. In addition, make sure that the email ID of each user in Kapost matches the primary email ID of the Oracle Identity Cloud Service account. Destination validation Select the check box. Issuer serial Select the check box. Subject confirmation Select the check box. Issuer url Enter the Sign-in URL/SSO Endpoint: https://<IDCS-Service-Instance>.identity.oraclecloud.com/fed/v1/idp/sso
.Issuer public cert Paste the certificate that you downloaded earlier during the Kapost registration in the "Registering and Activating the Kapost App" section. Full name attribute Enter email
.Audience url Enter https://<Domain_Name>.kapost.com/users/saml/auth
.Note: Enabling SSO deactivates the ability to log in using the user name and password. Remain logged in to the Kapost session until you complete the next section to verify that Identity Provider initiated SSO from Oracle Identity Cloud Service works.
Verifying the Integration
Use this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP Initiated SSO) and Kapost (SP Initiated SSO).
Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service
Access the Oracle Identity Cloud Service My Profile console using the URL:
https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole
.Log in using credentials for a user that is assigned to the Kapost app. Oracle Identity Cloud Service displays a shortcut to Kapost under My Apps.
Click Kapost. The Kapost home page appears.
In the upper-right corner of the header, confirm that the user that is logged in is the same for both Kapost and Oracle Identity Cloud Service.
This confirms that SSO that is initiated from Oracle Identity Cloud Service works.
Verifying Service Provider Initiated SSO from Kapost
Access Kapost using the URL:
https://<Domain_Name>.kapost.com/
, and then click Sign in with SSO. You are redirected to the Oracle Identity Cloud Service login page.Log in using credentials for a user that is assigned to the Kapost app. The Kapost home page appears.
In the upper-right corner of the header, confirm that the user that is logged in is the same for both Kapost and Oracle Identity Cloud Service.
This confirms that SSO that is initiated from Kapost works.
Troubleshooting
Use this section to locate solutions to common integration issues.
Known Issues
Kapost displays the error message, "Login Failed"
Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Kapost.
Solution: Ensure that the user that you assign to the Kapost app has an account in both Oracle Identity Cloud Service and Kapost with the same email address. Alternatively, enable Just-In-Time user provisioning while configuring SSO for Kapost. See the "Configuring SSO for Kapost" section.
Unknown Issues
For unknown issues, contact Oracle Support:
Go to https://support.oracle.com.
Select Cloud Support, and then sign in with your support credentials.
In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.
Select Oracle Identity Cloud Service as the service type.
Complete your service request.