Overview
This tutorial explains how to configure Incydr to use single sign-on (SSO) with PingOne.
This article assumes you are already familiar with SSO and the SAML standard. For more information about how Incydr implements SSO, see our Introduction to single sign-on.
Single sign-on (SSO) for Incydr
• These SSO instructions apply only if you access Incydr directly via a console.*.code42.com URL (typically for SSO configured before September 2025).
• If you access Incydr from the Mimecast Administration Console after signing in at login.mimecast.com, these instructions do not apply to you (typically for SSO configured after September 2025).
• Directory services information, however, applies to all Incydr environments.
Considerations
- The Incydr application in PingOne is intended for SSO as well as provisioning. This article describes only how to set up SSO. To learn how to set up provisioning, see How to provision users to Incydr from PingOne.
Before you begin
Determine whether you need to configure multiple Incydr tenants
Step 1: Determine the URLs for your environment
Step 2: Prepare PingOne
Use the PingOne administration console to add the Code42 application and download the PingOne metadata file. For more information about configuring PingOne, see the Ping Identity documentation.
- Sign in to the PingOne cloud dashboard.
- Navigate to Applications > Application Catalog.
- Search for Code42.
- Select the Code42 application whose Type is SAML with Provisioning (API).
An older Code42 application whose Type is simply SAML was formerly used for SSO configuration only. Use the newer application for both SSO and provisioning. - Click Setup.
The configuration screen appears. - Click Edit at the bottom of the configuration screen.
Retain the default configuration values unless otherwise specified below. - In SSO Instructions, click the Continue to Next Step button at the bottom of the page.
- In Connection Configuration, perform the following steps.
- In the provided connection fields, replace ${yourserver} with the domain name of your Incydr cloud. The resulting values should match the URLs you obtained in Step 1. For example:
-
ACS URL:
https://example.com/api/SsoAuthLoginResponse -
Entity ID:
https://example.com -
Target Resource:
https://example.com/login
-
ACS URL:
- Ensure that the Set Up Provisioning box is unselected. (This article describes only how to set up SSO. To set up provisioning, see How to provision users to Incydr from PingOne.)
Leave the rest of the settings on the page unchanged. - Click Continue to Next Step.
- In the provided connection fields, replace ${yourserver} with the domain name of your Incydr cloud. The resulting values should match the URLs you obtained in Step 1. For example:
- In Provisioning Instructions, review the provided directions and click Continue to Next Step.
- In Attribute Mapping, map attributes from PingOne to Incydr. Click Continue to Next Step when you finish.
Following are suggested values. Change the mapping as needed for your situation.Application Attribute Identity Bridge Attribute or Literal Value uid Email mail Email givenName First Name sn Last Name - In PingOne App Customization, customize your app display as desired and click Continue to Next Step.
- In Group Access, select the groups that have access to the Code42 application.
Users added to these groups have SSO provided by PingOne in Code42.- Click Add by the groups to have access.
- Click Continue to Next Step.
- In Review Setup, ensure the settings are correct.
- Download the SAML Metadata. You will use this metadata XML file to connect to your environment in subsequent steps.
- If you need to change any settings, click Back at the bottom of the page.
- After you are done reviewing settings and are sure they are correct, click Finish.
After configuration is complete, the Code42 application appears on the My Applications tab with its status shown as Active.
Step 3: Add PingOne as an authentication provider
-
Navigate to Administration > Integrations > Identity Management.
- Click Add Authentication Provider.
- In Display name, enter an identity provider name to display to users that sign in with SSO.
If your environment provides more than one SSO identity provider, users see a list of providers to choose from. They must select the provider configured for their Incydr organization. - In Provider's Metadata, click Upload XML File and select the metadata XML file for upload.
- Click Create Provider.
Authentication provider settings appear.
Note the following message on the dialog:
This provider will not be applied to an organization until you update the organization security settings.
Do not apply this authentication provider to organizations yet. You will apply this provider to a test organization and to production organizations in later steps.
- If you choose not to use the default mapping, you can use Attribute Mapping to customize mappings between Incydr user attributes and authentication provider SSO assertion attributes.
- Click the Edit icon.
- Deselect Use default mapping.
- Configure mapping settings for each Incydr user attribute.
Each field supports up to 128 characters. - Click Save.
- Click the Edit icon.
- Local Users displays the current user. If there are any other users you want to exempt from using this authentication provider to log in, enter them here.
Step 4: Add the Incydr service provider metadata URL to PingOne
- Obtain the service provider metadata URL:
- Sign in to the Incydr console.
- Navigate to Administration > Integrations > Identity Management > Authentication.
- Select the authentication provider you set up for PingOne.
- Copy the value of the Service Provider Metadata URL.
- Paste the URL into your PingOne application:
- Sign in to the PingOne cloud dashboard.
- Select Applications > Application Catalog.
- Select your Code42 application and click Edit.
- Click Continue to next step until you reach the Configure your connection page.
- In the Upload Metadata field, click Or use URL and paste the service provider metadata URL.
- Click Continue to next step, then Save & Publish.
Step 5: Test SSO authentication
This step requires you to create a test user in PingOne.
Step 6: Apply this provider to production organizations
Step 7: Add new users who sign in with SSO
- In the PingOne dashboard, add new users for whom you want to enable login to Incydr. See PingOne's documentation for information about adding users.
- Ensure the same users are set up in Incydr. You can add users manually with the Incydr console to an organization that uses SSO, or deploy agents to users in an organization that uses SSO.
What to expect
External resources
- Wikipedia:
- Ping Identity: PingOne Documentation
Comments
Please sign in to leave a comment.