Overview
This will outline the configuration needed to configure PingOne Customer or Enterprise SSO in CloudBolt as well as account/application configuration in PingOne.
Considerations
This requires an administrator account in PingOne to create an application and add Users. This assumes an PingOne organization is already created.
Procedure
Initial CloudBolt SSO configuration
Login as an Admin. Click on Admin Menu > Security > See All.
Select Single-Sign On (SSO).
Click on “Add a Single Sign-On IdP” box at top.
Select Generic SAML Provider menu item.
Complete the form as follows:
Name | PingIdentity <or any label> |
Name ID Format | Email Address or Unspecified |
Metadata Validity Limit | 24 |
Accepted Time Difference | 60 |
Contact Person | <any name> |
Organization Name | <any name> |
Organization Display Name | <any Display Name> |
Organization URL | <URL of PingOne organization> |
Sign Requests | Enabled |
Force Authentication | Disabled |
Assertion Signed | Enabled |
Response Signed | Disabled |
Allow Unknown Attributes | Enabled |
Create Unknown Users | Enabled |
Debug | Disabled |
Email Attribute Name | |
Given Name Attribute Name | firstName |
Surname Attribute Name | lastName |
User ID Attribute Name | userName |
Click Save.
Note the Single Sign-On URL
Note the Metadata URL / Entity ID
Click Download Metadata XML
Create the PingOne CloudBolt Application (PingOne Customer) (IN PROGRESS)
Log into the PingOne Enterprise Web Interface
Click on the Applications tab and select Add Application (LEFT OFF HERE)
On the New Application page, select WEB APP → SAML → Configure
Fill out the Application Name and Description. Click Next
Please configure the following on the Configuration SAML Connection page
ACS URLS → Input the Single Sign-On URL from the previous section
ENTITY ID → Input the Metadata URL / Entity ID from the previous section
ASSERTION VALIDITY DURATION (IN SECONDS) → 86,400 (24 hours)
Create the PingOne CloudBolt Application (PingOne Enterprise)
Log into the PingOne Enterprise Web Interface
Click on the SETUP tab, select Identity Repository and click Connect to an Identity Repository
PINGONE DIRECTORY
Select Next on the first section
Make Note of the MAP ATTRIBUTES, we will need those later
Click Save or Finish and we’ll configure PingOne Directory in the Application section below
Click on the Applications tab and select Add Application → Search Application Catalog
Type in Ping in the search box and and click the arrow next to the Ping IDaaS Directory Provisioner Application and click Setup
SSO Instructions
Download the Certificate and make note of all of the ID’s and URL’s and click Continue to Next Step
Connection Configuration
Upload Metadata → Select the metadata file you downloaded from the SSO section in CloudBolt Appliance
You should now see that the ACS URL and Entity ID fields are now filled out and should match your SSO Provider in CloudBolt
If everything looks good, click Continue to Next Step
PingOne App Customization - Ping IDaaS Directory Provisioner
Optional fields
Once you’re finished, click Continue to Next Step
Group Access
Add any groups that you have (if any)
Once you’re finished, click Continue to Next Step
Review Setup
Review all of the information
Make note of the Initiate Single Sign-On (SSO) URL
Download the Signing Certificate and the SAML Metadata
If everything looks good, click Finish
Now that we have the SAML Metadata, we need to upload it to the CloudBolt Appliance
Log into your CloudBolt Appliance
Click on the Admin tab and under Security, click Single Sign-On (SSO)
Select the Single Sign-On Provider that you’ve created before and click Upload IdP XML
Metadata Source → Metadata File
Metadata File → Select the file you downloaded in the previous section
Once everything is selected, click Save
You can now import the Certificate too if you want to use it
Now test to see if everything works
Click on the Users tab and create a new user
Make sure his group membership matches what you had for the groups in the previous section
Go to the Initiate Single Sign-On (SSO) URL that you made note of before and try to login with the new account
If it redirects to CloudBolt and you’re able to login, you’re all set
Configure Branding
Click on Admin → System → Branding and Portals
Click Add a portal on the top left
In the Add a portal window, fill out your Name, Domain/IP and select your Single Sign-On Provider
Once you have all of that set, click Create
Log out of the CloudBolt appliance and log back in
Now you should see a button at the bottom saying Log in with PingOne (or whatever you used for the Name in step 3)
Click the Log in with PingOne button and login with your credentials
If your account is valid, you should be logged into the CloudBolt appliance
Additional information
Include links to outside source articles or reference material if applicable
0 Comments