Ping Identity

In this document you are going to set up IDmelon as an external IdP to the Ping Identity.

Login to Ping Identity administration panel


  • Login to Ping Identity.
  • Open Ping Identity dashboard.
  • On the right side of navbar Click on Administrators

alt

Add Identity Provider


  • Click Connection
  • Under IDENTITY PROVIDERS Click on External IdPs

alt

  • Click on Add Provider

alt

  • Click on SAML

alt

Configure SAML 2.0 IdP


  • Configure SAML 2.0 IdP
    • Create IdP Profile
    • NAME : Custom_name
    • DESCRIPTION : Custom_description
    • ICON : Custom_icon
    • LOGIN BUTTON : Custom_login_button
    • Continue
    • Configure PingOne Connection then select Continue

alt

  • Configure IdP Connection
  • Choose : Manually enter the following metadata information

Get all values for {..} from your IDmelon panel. If you are currently login here, you will see the replaced values instead.

  • SSO endpoint : idmelon single sign on url
  • IdP entity ID : idp_issuer_uri
  • SSO binding : Specifies the binding to use for the authentication request. Select HTTP Post or HTTP Redirect.
  • VERIFICATION CERTIFICATE : idp_certificate_download_url

alt

  • Save and Continue
  • On the Map Attributes page, define how the PingOne user attributes are mapped to identity provider attributes. For more information, see Mapping attributes
    • Enter the PingOne user profile attribute and the external IdP attribute. For more information about attribute syntax, see Identity provider attributes
    • To add an attribute, click \+ Add attribute
    • To use the expression builder, click Build and test or Advanced Expression. See Using the expression builder
    • Select the update condition, which determines how PingOne updates its user directory with the values from the identity provider. The options are:
      • Empty only: Update the PingOne attribute only if the existing attribute is empty.
      • Always: Always update the PingOne directory attribute.

alt

  • Save & Finish
  • Enabling or disabling IDmelon as Identity Provider : Reference

alt

  • Finish

Setting idp-init for Ping Identity


alt

  • Add Application
    • Choose a custom application Name
    • Choose a custom application Description
    • Choose a custom application ICON
    • Choose OIDC Web App
    • Save

alt

  • Go to Oidc app which created
  • Activate Oidc app which on the rightside
  • Go to Configuration then click on Icon edit

alt

  • Go to ConnectionsApplications

  • For Admins IdP init Login

    • Click on PingOne Admin Console
    • Copy Home Page URL

    alt

    • Done

    For users IdP init Login:

    • Click on PingOne Application Portal
    • Copy Home Page URL

    alt

    • Done
  • Paste Home Page URL to Initiate Login URI field

  • Paste Home Page URL to Target Link URI field

alt

  • Click the Overview tab.
  • Locate the Client ID and copy it to a relaystate field of IDmelon.
  • Example : Relaystate = applicationId=Custom Client ID

alt

IDmelon SAML configuration


  • Go toConnectionsExternal IdPs
  • Go to IDmelon IdP then click on IdP Configuration click edit

alt

  • Download -> DOWNLOAD METADA File
    • You should upload metadata file and copy values of below fields from this Ping Identity panel to IDmelon Panel.

alt

  • Go to IDmelon IdP then click on P1 Connection click edit
    • Copy -> PINGONE (SP) ENTITY ID
    • Select your SIGNING CERTIFICATE
    • Select RSA_SHA256 in SIGNING ALGORITHM field
      • You should copy values of below fields from this Ping Identity panel to IDmelon Panel.

alt

Passwordless


  1. Open Admin dashboard of Ping Identity
  2. Click on Experiences then Authentication Admin dashboard of Ping Identity
  3. Under Authentication Policies
  4. Choose or createyour custom Authentication
  5. example :
    • Click on PRESENTED IDENTITY PROVIDERS
    • Choose IDmelon as Identity Provider
    • Save

alt

API Token


  • Click on Connections then Applications
  • Click on Add Applications then Choose Worker
  • Choose Custom name
  • Optional : Custom description
  • Click on Save

alt

  • Click on Worker hen Click on Configuration
  • Scroll down then Click on Get Access Token
  • Copy Access Token click on Done

alt

Note : Activate Worker Application

  • Done