Pingboard-integration-configuration-relying-party
2 years ago
Originally Published: 2021-11-03

Pingboard - SAML Relying Party Configuration - SecurID Access Implementation Guide

This section describes how to integrate SecurID Access with Pingboard using Relying Party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to Pingboard SAML Service Provider (SP).

Architecture Diagram

gmoison_0-1635964237158.png

 

Configure SecurID Access Cloud Authentication Service

Perform these steps to configure SecurID Access Cloud Authentication Service(CAS) as a relying party SAML IdP to Pingboard .

Procedure

  1. Sign into the Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party. Then select Add for a SAML service provider.

    gmoison_5-1635964440658.png

     

    gmoison_4-1635964432446.png

     

  2. On Basic Information page enter a Name for the application, ie. Pingboard Then click on Next Step.

  3. On Authentication page.

    1. select the RSA SecurID Access manages all authentication.

    2. Select the desired Primary Authentication Method from the dropdown list.

    3. Select the desired policy from the Access Policy for Additional Authentication.

    4. Click Next Step.

      gmoison_6-1635964472034.png

       

  4. On Connection Profile page.

    1. Under the Service Provider Metadata section.

      gmoison_3-1635964416930.png

       

    2. Enter the Assertion Consumer Service (ACS) . Enter a dummy value for now. For example, https://dummy.com. This will be populated later with SP metadata xml file.

    3. Enter the Service Provider Entity ID. Enter a dummy value for now. For example, dummy. This will be populated later with SP metadata xml file.

  5. Click on Save and Finish.

  6. Browse to Authentication Clients > Relying Parties

  7. Scroll down to the your newly created Relying Party and click down arrow to Edit and choose View or Download IdP MetatData and save off the metadata to be used in the Pingboard configuration below. When IdP metata data is loaded into the Pingboard configuration then proceed further.

    gmoison_2-1635964386930.png

     

  8. Click Edit on the newly created Relying Party configuration to load the Pingboard SP metadata information.

  9. Go to Connection Profile section.

  10. Click on Import Metadata and click on Choose File to load the SP Metadata file from Pingboard. This will populate the Service Provider Metadata information. You can also configure it manually with the information from the SP Metadata.

  11. Click on Save and Finish.

  12. Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.

    gmoison_1-1635964345259.png

     

 

Configure Pingboard

Perform these steps to integrate Pingboard with SecurID Access as a Relying Party SAML SP.

Procedure

  1. Sign into Pingboard and Click on Admin tab.

  2. Click on Add-ons.

  3. Select Custom SSO.

  4. For Dashboard IDP Metadata copy and paste the contents exported IDP Metadata saved above during SecurID CAS configuration.

  5. When the IDP Metadata is submitted, Pingboard will provide the URL to SP metadata xml file. Save off the metatdata into an xml file which will be used to further configuration SecurID Access configuration. Or use the information to manually configure SecurID.

  6. Save changes.

Configuration is complete.

Next Step: See main page for more certification information.