Single Sign-On with Ping Identity

In this tutorial, we will learn how to integrate Applivery with your Ping Identity Users Directory through SAML.

Ping Identity provides federated identity management and intelligent access so users can connect securely to the cloud, mobile, and on-premises applications. The platform uses adaptive authentication and SSO for single-click access to all apps. This prevents security breaches and helps with the management of sensitive data.

Please follow carefully the next steps.

Step 1 - Get the Service Provider information from Applivery #

Once in the Applivery Dashboard, navigate to your Workspace > Settings and go to the Login providers section. Now click the Configure button beside the SAML row depending on whether you want to configure it for the Dashboard, App Store, or MDM Portal.

login-providers

You will now see your SAML configuration, including a pre-configured SAML metadata XML file that you will be able to download and import into your Identity Provider.

ping-identity-saml-integration

Step 2 - Configure your Ping Identity Provider #

Now that you have your Service Provider information, it’s time to configure it in your IdP. For this example we will use Ping Identity.

Step 2.1 - Login into Ping Identity and create an App #

Log in to your Ping Identity console and go to Applications. Then select the Application section and click on the blue + button at the top of the page.

Enter your application name, select SAML Application, and click the Configure button when available.

ping-create-application
From the SAML Configuration, select Import Metadata, then upload the SAML Metadata XML file that you downloaded from the Applivery dashboard in the previous step.
upload-metadata-to-ping

Step 2.2 - Configure Ping Identity Single Sign-On with SAML #

From the Applications page, locate and select the application you just created, then enable the toggle switch.

enable-ping-application

Select the application and go to the Attribute Mapping tab. Click the pencil icon to edit the mappings.

  1. For the saml_subject attribute, select Email Address from the PingOne Mappings drop-down and click + Add.
  2. Next, add firstName to the Attributes field, select Given Name from the drop-down, and click + Add.
  3. Then, add lastName to the Attributes field, choose Family Name from the drop-down, and click + Add.
  4. Finally, add groups to the Attributes field, select Group Names from the drop-down, and click + Add.
ping-attribute-mappings

Once configured, click Save.

Step 2.3 - Download Federation Metadata XML file from Ping Identity #

Select the Configuration tab and click the pencil icon to edit the configuration. Choose the Sign Assertion & Response option, then click Save to apply your changes.

ping-configuration

Once the configuration is complete, you will need to click on the Download Metadata button, as this will download the Federation Metadata XML to complete the integration in the Applivery dashboard.

download-ping-metadata

Go back to the Applivery Dashboard > SAML Provider screen (same as in Step 1 of this tutorial) and upload the Federation Metadata XML file under Step 2.

Configure the attribute mappings for first name (firstName), last name (lastName) and groups (groups), then click Save changes.

Once saved, use the switch button to enable your new SAML integration in your organization.

saml-upload

Step 3 - Test it out #

And that’s it! Now that you have both ends (Ping Identity & Applivery) connected, you can Add some authorized users to Ping Identity (going to Directory > Users). Then navigate to your App Store URL or Dashboard Login Screen (https://dashboard.applivery.io/welcome/sso) and try to log in with an authorized user.

Updated on October 24, 2024
Was this article helpful?

On this page

— talk to an expert —

Talk to an expert

[Contact us] [EN] MDM & MAD
How many devices do you want to manage with Applivery?
Which operating systems do you want to manage?