Configure PingID SAML SSO

PingID is a multi-factor authentication (MFA) solution that integrates with existing identity systems to provide secure authentication and can also be used as part of a SAML SSO implementation that allows users to access multiple applications with a single set of credentials.

Key benefits of using PingID with SAML SSO:

  • Stronger security through MFA.
  • Centralized authentication management.
  • Audit trails of authentication events.
  • Compliance with organizational security and regulatory requirements.

Before you begin

Beginning with the 2023.2 release, access management in Itential Platform was expanded to include SAML SSO Authentication. Itential assumes the reader has completed the process of setting up SAML SSO Authentication in Itential Platform via Admin Essentials and has mapped their Identity Provider (Admin Essentials > Authorization > Identity Providers).

Keep in mind that each organization may have their PingID system configured differently and this guide is not all-inclusive of every system environment.

Additional resources:

  • Configuring a SAML Application — a basic guide to configuring PingID as a SAML Identity Provider on the Ping Identity site.
  • A short demo of how to set up PingID and a test application for SAML SSO:

Add PingID attributes

1

Copy the Entity ID from PingID

Sign in to PingID and go to the Itential Platform application that was set up under Applications. Under SAML Configuration, copy the Entity ID. This will be used to satisfy the Issuer parameter.

PingID Entity ID
2

Paste the Entity ID into Itential Platform

Sign in to Itential Platform and navigate to Admin Essentials > Authorization > Identity Providers > Configuration. Paste the Entity ID into the Issuer field.

Itential Platform IdP Issuer field
3

Copy the Single Signon Service key from PingID

In the PingID administrative console, go to Applications > Configuration and copy the Single Signon Service key. This will be used to satisfy the Login URL parameter on the Itential Platform Identity Providers Configuration form.

PingID Single Signon Service key and Signing Certificate
4

Upload the signing certificate and enter the Login URL

Download the Signing Certificate file from the PingID administrative console (Applications > Configuration). In Itential Platform, enter the Single Signon Service key in the Login URL field. Upload the certificate file to the Identity Providers Configuration form by drag-and-drop, or use the Click to Browse link to find and select the file.

Itential Platform IdP Login URL and certificate upload
5

Copy attribute mappings from PingID

In the PingID administrative console, go to Applications > Attribute Mappings and copy the Username, Group Names, and Email Addresses values from the PingOne column.

PingID Attribute Mappings
6

Paste attribute mappings into Itential Platform

In Itential Platform, on the Identity Providers > Configuration tab, paste the PingID values into the corresponding fields:

  • UsernameUsername Attribute
  • Group NamesGroups Attribute
  • Email AddressesEmail Attribute
Itential Platform IdP attribute fields
7

Save

Click Save at the top of the Identity Providers page (next to Test Connection) to retain all your inputs.

Test the PingID configuration

To enable PingID in Itential Platform, you must test the configuration first. Click the Test Connection button at the top of the Identity Providers page (under the Configuration tab). This initiates SSO SAML authentication with PingID in a new tab and displays a message indicating whether the test was successful.

If the test is successful, all parameters are set correctly and you can close the tab. After a successful test connection, Groups from the authentication server display and can be mapped to Itential Platform groups and roles. Map at least the pronghorn admin group to provide permissions within Itential Platform.

Successful test message

If the test is unsuccessful, there may be a problem with the parameters or certificate. Check your configured SAML settings to verify all attributes are mapped correctly.

Unsuccessful test message

Enable PingID SSO

Navigate to Admin Essentials > Authorization > Identity Providers. Locate the PingID IdP and slide the toggle switch to Enabled.

Once PingID is enabled, the Itential Platform authentication method immediately switches to SSO SAML.

Enable Identity Provider