PingOne (SAML v2.0)
Prerequisites
Permissions required for registering and configuring an app in PingOne.
The account must have permission to manage applications in PingOne. Ideally the account should be in the Organization Admin role.
Implement Single Sign-On (SSO)
It is recommended to use two separate browser tabs for the Keycloak (K) and PingOne (P) portals to make it easier to apply the settings.
(K) Open a new tab in your browser and login to the target Spark tenant. Access the Keycloak console from the User menu.
(K) Login to the Keycloak Admin Console using your admin credentials.
(K) Click Identity Providers from the left pane.
(K) Expand the Add provider dropdown and choose SAML v2.0.
(K) Fill in values for the Alias and Display Name fields. Please note this Display Name will appear in the button on the Spark login page.
(K) Copy the Redirect URI value.
(P) In a second browser tab, sign in to PingOne.
(P) Click on Applications on the left pane.
(P) Click (+) to add a new application.
(P) Enter an Application Name for this integration.
(P) Select SAML Application for Application Type.
(P) Click Configure.
(P) In SAML Configuration for Provide Application Metadata select Manually Enter.
(P) Paste the edited Redirect URI into the ACS URLs (Assertion Customer Service URL).
(K) Return to Keycloak. Copy the Service provider entity ID.
(P) Switch to PingOne. Paste the Service provider entity ID into the Entity ID field.
(P) Click Save.
(P) Click on the Configuration tab.
(P) Copy the IDP Metadata URL.
(K) Return to Keycloak. Paste the IDP Metadata URL into the SAML entity descriptor.
(K) Click Add.
(K) In NameID policy format, select Email.
(K) Click Save.
(P) Switch to PingOne. Click on Attribute Mappings.
(P) Click Edit.
(P) Set the following mappings:
AttributesPingOne Mappingssaml_subjectEmail AddressfirstNameGiven NamelastNameFamily NamegroupsGroup Names(P) Close the Application pane.
(P) Enable the toggle switch for the application.
(K) Return to Keycloak. Click on the Mappers tab and then click on Add mapper.
(K) Create 4 mappers with the following properties:
- KeyValue
Name
firstNameSync mode override
ForceMapper type
Attribute ImporterAttribute Name
firstNameName Format
ATTRIBUTE_FORMAT_BASICUser Attribute Name
firstName - KeyValue
Name
lastNameSync mode override
ForceMapper type
Attribute ImporterAttribute Name
lastNameName Format
ATTRIBUTE_FORMAT_BASICUser Attribute Name
lastName - KeyValue
Name
emailSync mode override
ForceMapper type
Attribute ImporterAttribute Name
saml_subjectName Format
ATTRIBUTE_FORMAT_BASICUser Attribute Name
email - KeyValue
Name
groupsSync mode override
ForceMapper type
Attribute ImporterAttribute Name
groupsName Format
ATTRIBUTE_FORMAT_BASICUser Attribute Name
groups
For SAML SSO, it is important to validate signatures to prevent unauthorized access. For more information see Importance of validating signatures in SAML.
(K) For the identity provider you have setup, scroll down to Signature and Encryption settings.
(K) Enable the option Validate Signature.
Navigate to your Spark tenant and sign in using the newly created provider. There will be a button on the Keycloak login page with the display name defined earlier.
Configure PingOne groups to Spark user groups
It is recommended to use two separate browser tabs for the Keycloak (K) and PingOne (P) portals to make it easier to apply the settings. In this guide, we will setup the automatic roles for the tenant-admin role.
(P) In the first tab sign in to PingOne.
(P) Select Directory in the left pane and select Groups.
(P) Click (+) to add a new group.
(P) Enter
tenant-admininto Group name and click Save.(P) Click on the Users tab and then click on Add Individually.
(P) Select your test user and click Save.
(K) Open a new tab in your browser and login to the target Spark tenant. Access the Keycloak console from the User menu.
(K) Login to the Keycloak Admin Console using your admin credentials.
(K) Select Identity Providers from the left pane and then the identity provider you configured in the previous section.
(K) Select the Mappers tab and then Add mapper.
(K) Provide the following values.
NameValueName
tenant-adminSync mode override
forceMapper type
Advanced Claim to Group(K) Click Add Claims.
(K) Provide the following values:
KeyValuegroupstenant-admin(K) Leave Regex Claim Values as Off (which is the default).
(K) Click Select Group, choose
tenant-admin, then click Select.(K) Click Save.
Sign in into Coherent Spark with your test account. Click on your initials and hover over the groups icon to confirm your membership in
tenant-admin.We highly recommend creating at least a few additional groups relevant for Private tenants:
Group for
supervisor:pfuser accounts. In Spark,supervisor:pfmembers can manage permissions across all folders.Groups for "standard" user accounts, e.g.
user:teamA,user:teamB. These groups can be assigned to the users in your organization not responsible for tenant administration. Creating multiple groups for "standard" user accounts can be useful to separate access between teams.
Last updated
