Loading...


Related Products


Date Published: January 28, 2022

Integrating Federated Authentication with Ping One

Note: This guide includes screenshots and instructions for a third-party platform that could change at any time. Be sure to reference Ping One's documentation for the latest information. 

Please find full documentation for Federated Authentication here.

  1. First, a Ping One administrator should select Add Application 
    1. Next, select Web App 
    2. Choose the SAML connection type 
    3. Create the App Profile. Enter information that will help you identify this application in Ping One. 
    4. Begin to Configure the SAML Connection. The console will ask you to Provide App Metadata. select Manually Enter from the 3 options. 
    5. At this point, Ping One will require information from the Cloud Platform, and Ping One will provide information that you will need to enter into the Cloud Platform. Refer to this documentation for more information. 
    6. You will need to get the ACS Link from the Cloud Platform, and enter it into the ACS URLS field in Ping One. The Cloud Platform will not generate the ACS Link until you’ve entered information from Ping One, most of which Ping One will not provide until you’ve provided the ACS Link. To work around this issue, do the following:
      1. On the Cloud Platform, enter placeholder values in the Entity ID and SSO URL fields (you’ll come back to update these later)
      2. In Ping One, navigate to the Signing Key. 
        1. Select Sign Assertion and Response
        2. Leave the Signing Algorithm as the default option
        3. Select Download the Signing Certificate 
        4. Open the certificate with a text editor, copy the certificate, and paste it into the Cloud Platform as shown in the documentation.
      3. Submit the information on the Cloud Platform to move onto the next page
      4. On the next page, the Cloud Platform will display the ACS Link
      5. Enter the ACS Link into the Ping One field labeled ACS URL 
    7. In the Encryption section, do not Enable Encryption 
    8. In the Entity ID field, enter the Entity ID provided by the Cloud Platform
    9. Leave the SLO Endpoint and SLO Response Endpoint fields blank
    10. For SLO Binding, select HTTP Redirect
    11. For Assertion Validity, choose your preferred duration
    12. The remainder of the fields can be left empty or with default values 
    13. On the Attribute Mapping page, set the PingOne User Attribute to Email Address 
    14. The next screen will display your new Application. Click on Configuration to retrieve the information that you need to provide to the Cloud Platform to finish the integration. 
       

    15. At this point, go back into the Cloud Platform, and select Edit to update the placeholder values you provided on the Register an Identity Provider screen. 
      1. In the Entity ID field, replace the placeholder value with the Issuer ID provided by Ping
      2. In the SSO URL field, replace the placeholder value with the Single SignOn Service value provided by Ping
    16. Double check this information, and submit. Review your final configuration and Enable the connection when you are ready. 

Did not find what you were looking for?

If this content did not answer your questions, try searching or contacting our support team for further assistance.

Back to Section navigation