Keeper

Before You Begin

Introduction

This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Keeper using SAML.

About Keeper

Keeper is a secure password manager and digital vault for businesses and individuals. It protects and manages passwords, documents, private photos, and other secret information.

After integrating Keeper with Oracle Identity Cloud Service:

  • Users can access Keeper using their Oracle Identity Cloud Service login credentials.
  • Users can start Keeper using the Oracle Identity Cloud Service My Apps console.
  • Admins can assign and revoke user access to the Keeper app using the Oracle Identity Cloud Service administration console.

What Do You Need?

  • An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
  • A Keeper account with authorization rights to configure federated authentication.
  • Identity Provider Metadata. To learn about other methods you can use to access SAML metadata, see Access SAML Metadata. Tip: Use this file later in the "Configuring SSO for Keeper" section.
  • A virtual or local machine with public IP address to install the Keeper SSO Connect application.

Configuring SSO for Keeper

  1. Access Keeper using the URL: https://keepersecurity.com.

  2. In the upper-right corner, click Login, and then select Admin Console Login.

  3. On the login page, log in as an administrator. The Keeper home page appears.

  4. Select the Advanced Configuration tab. The Advanced Configuration dialog box appears.

  5. Enable Show Node Structure, and then close the dialog box.

  6. Click Add Node (+) under the Search text box to add a node. The Add Node dialog box appears.

  7. Enter SSO in the Node Name, and then click Create. The newly created node is listed in the page.

  8. Select the newly created node, click Bridge/SSO, locate the Keeper SSO Connect section, and then click Download for Windows to download the Keeper SSO Connect installer for SAML configuration.

    Note: Keeper SSO Connect is a SAML 2.0 compatible Service Provider (SP) application.

  9. Use the downloaded installer and install Keeper SSO Connect in a virtual or local machine with a public IP address.

  10. Log in to Keeper SSO Connect using credentials for a user that is assigned to the Keeper app, and then select the SSO Connection from the drop-down list. The SSO Connect window displays the Setup page.

    Note: You can change the Host Name if required. This change reflects in the Server Base URL.

  11. Locate the SAML Metadata section, click Drop File Here or Click to Upload, upload the Identity Provider Metadata that you obtained earlier in the "What Do You Need" section, and then click Save.

  12. Access Keeper as an administrator using the URL: https://keepersecurity.com/en_US/console/#login. The Admin page appears.

  13. Select the newly created node, click Bridge/SSO, locate the Manage SSO Connect for SSO section, and then click the adjacent number. The SSO Connect URL is populated.

  14. Make note of the Host Name from the SSO Connect URL: https://<Host_Name>/sso-connect/saml/login.

    Tip: Use this Host Name value later during Keeper registration in the "Registering and Activating the Keeper App" section.

  15. Make note of the value in the Enterprise Domain text box.

    Tip: Use this value later while verifying the service provider initiated integration in the "Verifying Service Provider Initiated SSO from Keeper" section. You provide this value to your SSO users for single sign-on.

  16. Locate the New User Provisioning section, and then select Dynamically provision users upon successful login to SSO. When selected, Keeper can be accessed by a vault user who is assigned to the Keeper app in Oracle Identity Cloud Service, even if the user does not have a Keeper account. However, the admin console can only be accessed by an admin user with Keeper account.

    Note: If you disable this option, then make sure that the email ID of each user in Keeper matches the primary email ID of the Oracle Identity Cloud Service account.

Configuring the Keeper App in Oracle Identity Cloud Service

Use this section to register and activate the Keeper app, and then assign users to the app.

Registering and Activating the Keeper App

  1. Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.

  2. Click App Catalog.

  3. Search for Keeper, and then click Add.

  4. In the App Details section, enter your Keeper Host Name, and then click Next.

    Note: This is the host name value that you obtained earlier in the "Configuring SSO for Keeper" section.

  5. Click Finish. Oracle Identity Cloud Service displays a confirmation message.

  6. Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Assigning Users to the Keeper App

  1. On the Keeper app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.

  2. Select users that you want to assign to Keeper, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Keeper app is assigned to the users that you selected.

Verifying the Integration

Use this section to verify that SSO/SLO works when initiated from Oracle Identity Cloud Service (IdP initiated) and Keeper (SP initiated).

Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service

  1. Access the Oracle Identity Cloud Service My Profile console using the URL: https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole.

  2. Log in using credentials for a user that is assigned to the Keeper app. Oracle Identity Cloud Service displays a shortcut to Keeper under My Apps.

  3. Click Keeper, and then click Connect. The Keeper home page appears.

  4. Click Account in the header menu, and then confirm that the user that is logged in is the same for both Keeper and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Oracle Identity Cloud Service works.

Verifying Service Provider Initiated SSO from Keeper

  1. Access Keeper as an administrator using the URL: https://keepersecurity.com/vault, and then click Use Enterprise SSO Login. The Enterprise SSO Login page appears.

  2. Enter the Enterprise Domain number, and then click Connect. You are redirected to the Oracle Identity Cloud Service login page.

    Tip: This is the Enterprise Number value that you obtained earlier in the "Configuring SSO for Keeper" section.

  3. Log in using credentials for a user that is assigned to the Keeper app. The Keeper home page appears.

  4. Click Account in the header menu, and then confirm that the user that is logged in is the same for both Keeper and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Keeper works.

Verifying Single Log-Out (SLO) from Oracle Identity Cloud Service

  1. Access Keeper from the Oracle Identity Cloud Service My Profile console using the URL: https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole. The Keeper home page appears.

  2. In the upper-right corner of the Oracle Identity Cloud Service My Profile console, click the user drop-down list, and then click Sign Out. The Oracle Identity Cloud Service My Profile console login page appears.

  3. Confirm that the user is logged out of the Keeper app.

    Note: The user is logged out of both Oracle Identity Cloud Service and the Keeper app when log out is initiated from Oracle Identity Cloud Service.

This confirms that SLO that is initiated from Oracle Identity Cloud Service works.

Verifying Single Log-Out (SLO) from Keeper

  1. Access Keeper following the steps from the "Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service" or "Verifying Service Provider Initiated SSO from Keeper" sections.

  2. Log in using credentials for a user that is assigned to the Keeper app. The Admin page appears.

  3. In the upper-right corner, click Logout. You are redirected to the Keeper login page.

Note: If the user has already logged in to Oracle Identity Cloud Service My Profile console in the browser, that session is logged out, and then the login page appears.

This confirms that SLO that is initiated from Keeper works.

Troubleshooting

Use this section to locate solutions to common integration issues.

Known Issues

Keeper displays the error message, "This Keeper account has Enterprise SSO Login enabled, and this feature is not supported. Please contact your Keeper administrator or email business.support@keepersecurity.com."

Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Keeper.

Solution: Ensure that the user that you assign to the Keeper app has an account in both Oracle Identity Cloud Service and Keeper with the same email address. Alternatively, enable Just-In-Time user provisioning while configuring SSO for Keeper. See the "Configuring SSO for Keeper" section.

Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."

Cause 1: The SAML 2.0 integration between the Oracle Identity Cloud Service Keeper app and Keeper is deactivated.

Solution 1:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Keeper.
  • In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Cause 2: The administrator revokes access for the user at the same time that the user tries to access the Keeper app using Oracle Identity Cloud Service.

Solution 2:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Keeper.
  • In the App Details section, select Users, and then click Assign to re-assign the user.

Unknown Issues

For unknown issues, contact Oracle Support:

  1. Go to https://support.oracle.com.

  2. Select Cloud Support, and then sign in with your support credentials.

  3. In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.

  4. Select Oracle Identity Cloud Service as the service type.

  5. Complete your service request.