New Riva On-Premise installations include a new strategy to provide impersonation access into Salesforce: the Standard Impersonation Model. For instructions on implementing the Standard Impersonation Model, see Prepare Salesforce for Riva and Create and test a Salesforce connection.
For current Riva On-Premise installations that use Salesforce Single Sign-On, administrators are encouraged to upgrade their Riva for Salesforce connection setup to the Standard Impersonation Model. For assistance, contact the Riva Success Team.
The procedures in the following article have been deprecated. The information is being retained for clients who have not yet converted to the new Standard Impersonation Model.
This method of deploying Riva is used to sync to one or more Salesforce.com target users without enabling Single Sign-on (SSO). For each target Salesforce user, you will create an individual Riva connection to Salesforce (this requires the user's login and password) and a corresponding individual CRM sync policy that uses the target user's Salesforce connection. The target user Exchange accounts will be accessed using a single Exchange connection that can impersonate the target user mailboxes.
This article will discuss:
- Configure Salesforce Trusted Network Access
- Prepare the Salesforce Target User accounts
- Windows system requirements
Configure Salesforce Trusted Network Access
The Salesforce administrator needs to set up trusted network access so that Salesforce user Security Tokens are not required. See Enable Trusted Network Access for Riva On-Premise for instructions.
Prepare the Salesforce Target User accounts
Riva will connect to Salesforce using the credentials of the target CRM account. Each target CRM account will need a Riva CRM connection and a corresponding CRM synchronization policy. For each target user account:
- Create a Salesforce.com account, or use the credentials of an existing account.
- Know the Salesforce username and password for each target account.
- Note - if Trusted Network Access has not been configured then have access to the Salesforce.com security token for each target Salesforce user account (see How to Request a Salesforce Security Token)
- The primary email address for each target Salesforce user account must match the primary SMTP email address of the corresponding email system account (Exchange or GroupWise).
Windows system requirements
- If IE is configured to connect to a WPAD server:
- disable that setting, or
- configure an App.Setting that provides an alternate proxy connection, or
- configure the "Use Proxy" settings on the Riva connection to Salesforce.com. (after the connection is created).
- Configure local or corporate firewalls to enable connection to Salesforce.com.
- Confirm that you can log in to the Salesforce.com login web page (login.salesforce.com) from the Windows system hosting the Riva CRM server.