asfenion.blogg.se

Hightail help
Hightail help













hightail help
  1. HIGHTAIL HELP HOW TO
  2. HIGHTAIL HELP DOWNLOAD

HIGHTAIL HELP DOWNLOAD

See Choose a certificate file for the latest information.Įnter the SAML Authority (Service Provider) URL that you saved in Configure Hightail on its web site (part 1)Ĭopy this URL and paste it in SAML Authority (Identity Provider) field on the Hightail website in Configure Hightail on its web site (part 2)Ĭlick Download Signing Certificate and save it on your computer.

HIGHTAIL HELP HOW TO

The description of how to choose and download a signing certificate in this document might differ slightly from your experience. You need administrator privileges in Hightail to perform these steps. You can configure Hightail for either or both types of SSO.

hightail help hightail help

Hightail offers both IdP-initiated SAML SSO (for SSO access through the user portal or CyberArk mobile applications) and SP-initiated SAML SSO (for SSO access directly through the Hightail web application). You can specify an IP Range in the Admin Portal Policy page to restrict access to the application.Ĭonfigure Hightail on its web site (part 1) Note that administrators cannot reset a user’s password.Īccess restriction using a corporate IP range Refer to Hightail documentation for details. Separate administrator login after SSO is enabledĪfter SSO is enabled, administrators can continue to log in to Hightail with their local user name and password.

hightail help

If SP-initiated is enabled, IdP-initiated SSO is still supported.Īfter SSO is enabled, users can continue to log in to Hightail with their local user name and password. The following table lists features and functionality specific to Hightail. What you need to know about HightailĮach SAML application is different. You also upload the public key certificate in a. p12 file to the application settings in the Admin Portal. If you use your own certificate, you upload the signing certificate and its private key in a. To establish a trusted connection between the web application and the CyberArk Identity, you need to have the same signing certificate in both the application and the application settings in the Admin Portal. You can either download one from the Admin Portal or use your organization’s trusted certificate. Hightail requirements for SSOīefore you configure the Hightail web application for SSO, you need the following:Īn active Hightail account with administrator rights for your organization. For details, see Configure Hightail on its web site (part 1).Īfter you have finished configuring the Hightail web application and the application settings in the Admin Portal, users are ready to launch the application from the user portal. You will need to copy some settings from Application Settings in the Admin Portal, the Administrator portal, and paste them into fields on the Hightail website. Once the application settings are configured, complete the user account mapping and assign the application to one or more roles.Ĭonfigure the Hightail application for single sign-on (part 2). In the Admin Portal, add the application and configure application settings.įor details, see Configure Hightail in the Admin Portal. For this reason, there are two parts to configuring the Hightail website one before configuration in the Admin Portal and one after. You will need to copy some settings from the Admin Portal into the Hightail website, and you will need to copy some settings from the Hightail website into the Admin Portal. You will need to copy some settings from the Hightail website into the Admin Portal. The following is an overview of the steps required to configure the Hightail Web application for single sign-on (SSO) via SAML.Ĭreate Hightail user accounts and make sure you have a Hightail account with administrator rights to configure SSO.Ĭonfigure the Hightail application for single sign-on (part 1).įor details, see Configure Hightail on its web site (part 1).















Hightail help