Salesforce integration
There are several tasks that you need to complete to integrate Identity Security Posture Management (ISPM) with your Salesforce tenant:
- Add ISPM IPs to your Trusted IP Range
- Create a permission set
- Assign the permission set
- Download the server file
- Create an OAuth app
- Share the parameters with ISPM
Add ISPM IPs to your Trusted IP Range
For the integration to succeed, you must have the ISPM IP addresses 13.52.68.184 , 54.193.209.206 , 13.57.96.208 , and 184.72.14.192 in your trusted IP range.
-
From the left menu, go to
. -
Click Network Access. The Trusted IP Range page opens.
-
Create a rule for each of the IPs above:
-
Click New.
-
Set the IP as the Start IP Address and the End IP Address.
-
Add a description. For example, ISPM IP number 1.
-
-
Repeat steps 1 - 3 for each ISPM IP address.
Create a permission set
-
In your Salesforce tenant, go to
. -
In ADMINISTRATION, select . The Permission Sets page opens.
-
Click New. The Create screen opens.
-
In the Enter permission set information section, enter ISPM SFDC integration permission as the Label.
-
Optional. Enter a description.
-
In the Select the type of users who will use this permission set section, set the License to None.
-
Click Save.
-
Scroll down to the System section and select System Permissions. The ISPM SFDC integration permission page opens.
-
Click Edit to modify system permissions.
-
Select the following system permissions:
System permission Notes API Enabled Select this checkbox to access any Salesforce.com API. View Setup and Configuration The View Roles and Role Hierarchy permission is selected automatically. View All Data The following permissions are selected automatically: - Read and View All on all standard and custom objects
- View Setup and Configuration
- View Event Log Files
- View Dashboards in Public Folders
- View Reports in Public Folders
- View Login Forensics Events
- View Real-Time Event Monitoring Data
Manage Multi-Factor Authentication in API The following permissions are selected automatically: - Manage Users
- Reset User Passwords and Unlock Users
- View All Users
- Manage Profiles and Permission Sets
- Assign Permission Sets
- Manage Roles
- Manage IP Addresses
- Manage Sharing
- View Setup and Configuration
- Manage Internal Users
- Manage Password Policies
- Manage Login Access Policies
- Manage Multi-Factor Authentication in User Interface
-
Select the following user permissions:
-
View All Profiles
-
-
Click Save. The Permission Changes Confirmation screen opens.
-
Review the permissions that you selected and click Save.
Assign the permission set
-
In your Salesforce tenant, go to
. -
In ADMINISTRATION, select .
-
Select a user account that you want to use for the ISPM integration. This account must have Salesforce as its user license.
-
Go to the Permission Set Assignments section.
-
Click Edit Assignments.
-
Find and select the Identity Security Posture Management SFDC integration permission set.
-
Click Add.
-
Ensure that it appears in the Enabled Permission Sets section.
-
Click Save.
Download the server file
-
In the Identity Security Posture Management console, go to .
- Select Salesforce.
- Click Download server.crt.
Create an OAuth app
-
In your Salesforce tenant, go to
. -
Under PLATFORM TOOLS, select .
-
Click New Connected App.
-
Click Create a Connected App.
-
In the Basic Information section, enter a name for the new app (for example, ISPM SFDC Integration).
-
Enter support@spera.security as the Contact Email.
-
In the API (Enable OAuth settings) section, select the Enable OAuth settings checkbox.
-
Enter http://localhost:1717/OauthRedirect as the Callback URL.
-
Select the Use digital signatures checkbox.
-
Click Choose file and upload the server.crt file that you downloaded earlier from the Identity Security Posture Management console.
-
Add the following OAuth scopes:
-
Manage user data via APIs (api)
-
Manage user data via Web browsers (web)
-
Perform requests at any time (refresh_token, offline_access)
-
-
Verify that the Require Secret for Web Server Flow and Require Secret for Refresh Token Flow checkboxes are selected.
-
Click Save.
Copy the consumer key
- In the API (Enable OAuth settings) section, click Manage Consumer Details.
- Copy the Consumer Key value that appears and store it safely.
Configure policies
- Go back to the tab with the app info and click Manage.
- Click Edit Policies.
- In the OAuth Policies section, set the Permitted Users as Admin approved users are pre-authorized.
- Check that IP Relaxation is set as Enforce IP restrictions.
- Set the Refresh Token Policy as Expire refresh token if not used for and set the timer to 90 days.
- In the Session Policies section, set the Timeout Value to 15 minutes.
- Click Save.
Assign the permission set to a profile
- On the connected app's tab, scroll down to the Profiles section.
- Select the system admin or standard user profile that matches the one that's assigned to the ISPM integration account.
- Click Save.
- In the Permissions Sets section, click Manage Permission Sets.
- Select the ISPM SFDC integration permission set that you created earlier.
- Click Save.
Share the parameters with ISPM
-
In the Identity Security Posture Management console, go to .
- Select Salesforce.
- Enter the username of the user that you assigned to the permission set.
- Enter the consumer key that you copied earlier.
- Click Submit.