orchestrator
2022.4
false
UiPath logo, featuring letters U and I in white
Orchestrator User Guide
Automation CloudAutomation Cloud Public SectorAutomation SuiteStandalone
Last updated Oct 9, 2024

Private Key Certificates

When configuring SAML 2.0 authentication, it is necessary to specify certain claims for the certificate provided by the identity provider. This is a step-by-step procedure on how to configure your Orchestrator instance to use a private key SAML certificate. The procedure begins with importing the certificate into the Windows Local Machine certificate store using Microsoft Management Console, and continues with the actual configuration steps required in Orchestrator/Identity Server.

Importing a Certificate in Windows

  1. Go to Control Panel > Manage Computer Certificates. The console is displayed.
  2. In the Console Root window's left pane, expand the Trusted Root Certification Authorities folder and then click Certificates.


  3. Right-click Certificates and then select All Tasks > Import. The Certificate Import Wizard is displayed.


  4. Make sure that Local Machine is selected in the Store Location section. Click Next.
  5. Click Browse and select the certificate to upload.
  6. Repeat this process for the Console Root / Personal folder.

Setting Orchestrator/Identity Server to Use the Certificate

  1. Once the upload is complete, the certificate should be displayed in the console.
  2. Double-click it. The Certificate dialog box is displayed.
  3. On the Details tab, scroll through the list of fields and click Thumbprint.


  4. Copy the hexadecimal characters from the box.
  5. Remove the spaces between the characters. For example, the thumbprint "a9 09 50 2d d8 2a e4 14 33 e6 f8 38 86 b0 0d 42 77 a3 2a 7b" should be specified as "a909502dd82ae41433e6f83886b00d4277a32a7b" in Identity Server's Saml2 settings within External Providers page.
    Note: When copied from the box on the Certificate window, the thumbprint contains several special characters that are only visible in ANSI encoding. Make sure to delete those using a suitable application such as Notepad++.

    See below an example of getting a thumbprint ready for Identity Server's Saml2 settings within External Providers page.



  6. Log in to the host Management portal as a system administrator.
  7. On the Users page, select the Authentication Settings tab.
  8. In the External Providers section, click Configure under SAML 2.0:


    The Configure SAML 2.0 panel opens at the right of the window.

  9. Under the Signing Certificate section, set the following:
    • Store name - select My
    • Store location - select LocalMachine
    • Thumbprint - enter the thumbprint value you've previously prepared.
  10. Click Save at the bottom to save you changes and close the panel.
  11. Restart the IIS server. This is required after making any changes to External Providers.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.