Loading
Salesforce now sends email only from verified domains. Read More
Identify Your Users and Manage Access
Table of Contents
Select Filters

          No results
          No results
          Here are some search tips

          Check the spelling of your keywords.
          Use more general search terms.
          Select fewer filters to broaden your search.

          Search all of Salesforce Help
          Configure SSO from Salesforce to New Relic

          Configure SSO from Salesforce to New Relic

          Let your users log in to New Relic using single sign-on (SSO) from your Salesforce org configured as an identity provider.

          Required Editions

          Available in: Lightning Experience and Salesforce Classic
          Available in: Enterprise, Performance, Unlimited, and Developer Editions

          When you set up New Relic as a service provider and create a connected app in Salesforce, users can access New Relic using their Salesforce credentials. New Relic supports the SAML protocol for both identity provider–initiated and service provider–initiated SSO.

          Note
          Note Contact your New Relic representative to enable SSO settings for your New Relic account. To complete these steps, you need a SAML-enabled enterprise administrative account for New Relic.

          Follow these high-level steps to configure SSO for Salesforce to New Relic.

          Set Up Your Salesforce Org as an Identity Provider

          With the My Domain feature, your Salesforce org is enabled as an identity provider. My Domain is required for all orgs. If you don’t like your org’s My Domain name, you can change it.

          The My Domain feature also creates a certificate and key pair. The certificate establishes trust between your Salesforce org and ADP. Optionally, you can use another self-signed certificate or import a CA-signed certificate.

          To download the Salesforce self-signed certificate:

          1. From Setup, enter Identity Provider in the Quick Find box, and select Identity Provider.
          2. Click Download Certificate.

          Configure SAML Settings in New Relic

          1. Log in to your SAML-enabled New Relic account as an administrator.
          2. Under Account Settings and Integrations, navigate to the page to configure SSO settings.
          3. Under New Relic SAML Service Provider details, the page lists the Metadata URL, the Assertion Consumer URL, the Consumer Binding, and NameID Format settings. You need these settings later when you set up a connected app.
            SAML service provder settings for New Relic
          4. For the SAML identity provider certificate, choose the Salesforce certificate that you downloaded.
            upload your Salesforce IdP certificate
          5. For the remote login URL, enter the service provider–initiated POST endpoint URL, for example https://MyDomainName.my.salesforce.com/idp/endpoint/HttpPost.
            remote login URL
          6. Optionally, enter a logout landing URL, for example https://MyDomainName.my.salesforce.com/secur/logout.jsp.
          7. Save the settings.
          8. To test the SAML connection, click Test SAML Login.
          9. If you’ve configured the SAML settings correctly, enable SAML SSO to your account.
          10. Enabling SAML SSO generates a SAML login URL, for example, https://rpm.newrelic.com/accounts/224357/sso/saml/login. This URL is your service provider–initiated login URL that you can use in testing.

          Create a Connected App in Salesforce

          1. In Salesforce, create a connected app.
            • In Lightning Experience, from Setup, enter App in the Quick Find box, and select App Manager. Click New Connected App.
            • In Salesforce Classic, from Setup, enter Apps in the Quick Find box, and select Apps. Under Connected Apps, click New.
          2. Configure the connected app Basic Information settings.
            1. Enter a name for the New Relic connected app. Salesforce uses this name to populate the API name.
            2. Enter your email address in case Salesforce needs to contact you or your support team.
            3. Optionally, upload or specify a logo and icon to represent your New Relic application in the Salesforce App Launcher.
            basic settings for the connected app
          3. Configure the connected app Web App Settings.
            1. Select Enable SAML.
            2. For Entity Id, enter http://rpm.newrelic.com.
            3. For ACS URL, enter the URL from the New Relic SAML settings, for example https://rpm.newrelic.com/accounts/yourAccountID/sso/saml/finalize, where yourAccountID is your New Relic account. For example, https://rpm.newrelic.com/accounts/223456/sso/saml/finalize.
            4. For Subject Type, select how users are identified to the identity provider, for example, Federation ID. A federation ID is a unique value assigned to the user across multiple web services and Salesforce orgs.
            5. For Name ID Format, select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
            6. For Issuer, keep the default value, which is your My Domain login URL.
            7. For IdP Certificate, keep the default (Default IdP Certificate).
            web app settings for the connected app
          4. Save the settings.
          5. Configure profiles and permission sets for the connected app.
            1. From Setup, enter Apps in the Quick Find box.

              If you’re using Lightning Experience, select Manage Connected Apps.

              If you’re using Salesforce Classic, under Manage Apps, select Connected Apps.

            2. Click the name of your connected app for New Relic. The connected app detail page appears.
            3. Click Manage Profiles or Manage Permission Sets, and add profiles or permission sets for the users who can access this app.
          6. In Salesforce, enter the start URL for the connected app.
            1. On the connected app detail page, under SAML Login Information, copy the IdP-initiated login URL.
            2. On the connected app detail page, click Edit Policies.
            3. For Start URL, paste the IdP-initiated login URL.
            4. Save the settings.

          Test the SSO Configuration

          1. In Salesforce, from the App Launcher, find and open the New Relic app. If you configured the New Relic logo and icon for the connected app, the App Launcher displays them. If identity provider–initiated SSO is configured properly, Salesforce creates an application session.
            select New Relic from the Salesforce App Launcher
          2. To test service provider–initiated SSO, enter the service provider–initiated login URL, for example https://rpm.newrelic.com/accounts/yourAccountID/sso/saml/login, where yourAccountID is your New Relic account. For example, https://rpm.newrelic.com/accounts/224357/sso/saml/login. If SSO is configured properly, you’re prompted to log in to your Salesforce org. After you enter your credentials, Salesforce redirects you to your initial request URL. You’re logged in to your New Relic account.
           
          Loading
          Salesforce Help | Article