Ping Identity PingFederate 9.3 - Configure Internal Applications andor Identity Management System Configuration - RSA Ready SecurID Access Implementation Guide
2 years ago
Originally Published: 2020-01-27

Follow the instruction steps in this section to apply your Authentication API, SSO Agent and Relying Party configuration to Ping Identity PingFederate Internal Applications and/or Identity Management System.

 

Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.

Procedure

1. On the Target Session Mapping page, click Map New Adapter Instance button.

sso-cas-relparty-pingfed-step13.png

2. On the Adapter Instance page, click the Manage Adapter Instances button.

sso-cas-relparty-pingfed-step14.png

3. On the Manage SP Adapter Instances page, click Create New Instance button.

sso-cas-relparty-pingfed-step15.png

4. On the Type page, enter INSTANCE NAME and INSTANCE ID, select OpenToken SP Adapter from the Type drop-down menu and click Next.

sso-cas-relparty-pingfed-step16.png

5. On the Instance Configuration page, enter the PASSWORD and CONFIRM PASSWORD field values (This is used to generate the encryption key and is not referenced elsewhere) and click Next.

sso-cas-relparty-pingfed-step17.png

6. On the Actions Page, click Next.

sso-cas-relparty-pingfed-step18.png

7. On the Extended Contract page, click Next.

sso-cas-relparty-pingfed-step19.png

8. On the Target App Info page, leave the APPLICATION NAME and URL fields blank and click Next.

sso-cas-relparty-pingfed-step20.png

9. On the Manage SP Adapter Instances page, click Save.

sso-cas-relparty-pingfed-step21.png

10. On the Adapter Instance page, from the ADAPTER INSTANCE drop-down, select the adapter name created above and click Next.

sso-cas-relparty-pingfed-step22.png

11. On the Adapter Data Store page, select the USE ONLY THE ATTRIBUTES AVAILABLE IN THE SSO ASSERTION radio button and click Next.

sso-cas-relparty-pingfed-step23.png

12. On the Adapter Contract Fulfillment page, select Assertion from the Source drop-down menu, SAML_SUBJECT from the Value drop-down menu and click Next.

sso-cas-relparty-pingfed-step24.png

13. On the Issuance Criteria page, click Next.

sso-cas-relparty-pingfed-step25.png

14. On the Summary page, review the information and click Done.

sso-cas-relparty-pingfed-step26.png

15. On the Target Session Mapping page, click Next.

sso-cas-relparty-pingfed-step27.png

16. On the Summary page, review the information and click Done.

sso-cas-relparty-pingfed-step28_624x390.png

17. On the User-Session Creation page, click Next.

sso-cas-relparty-pingfed-step29.png

18. On the Protocol Settings page, click Configure Protocol Settings button.

sso-cas-relparty-pingfed-step30.png

19. On the SSO Service URLs page, click Next.

sso-cas-relparty-pingfed-step31.png

20. On the Allowable SAML Bindings page, check the POST and REDIRECT check-boxes only and click Next.

sso-cas-relparty-pingfed-step32.png

Note:  RSA SecurID Access does not support ARTIFACT and SOAP SAML binding methods.

21. On the Overrides page, click Next.

sso-cas-relparty-pingfed-step33.png

22. On the Signature policy page, select the USE SAML-STANDARD SIGNATURE REQUIREMENTS radio button and click Next.

sso-cas-relparty-pingfed-step34.png

23. On the Encryption Policy page, select the NONE radio button and click Next.

sso-cas-relparty-pingfed-step35.png

24. On the Summary page, review the information and click Done.

sso-cas-relparty-pingfed-step36.png

25. On the Protocol Settings page, review the information and click Next.

sso-cas-relparty-pingfed-step37.png

26. On the Summary page, review the information and click Done.

sso-cas-relparty-pingfed-step38.png

27. On the Browser SSO page, click Next.

sso-cas-relparty-pingfed-step39.png

28. On the Credentials page, click Next.

sso-cas-relparty-pingfed-step40.png

29. On the Activation & Summary page, toggle the Connection Status to Active, make note of the SSO Application Endpoint URL and click Save.

sso-cas-relparty-pingfed-step41.png

30. On the Service Provider page, under IDP CONNECTIONS, click Manage All button.

sso-cas-relparty-pingfed-step42.png

31. On the IdP Connections page, locate the IdP Connection just created, open the Select Action menu and click Export Metadata.

sso-cas-relparty-pingfed-step43.png

Note:  If you had set temporary placeholder values during the RSA SecurID Access SAML IdP configuration, then go back and replace them using the PingFederate SAML SP metadata file.

 

Configuration is complete.

Return to the main page for more certification related information.