Aware 2.0- PingFederate SAML 2.0

This article contains information on configuring PingFederate SAML 2.0 with Aware, including required customer-provided details, step-by-step setup instructions, and guidelines for completing the SSO integration.

To configure PingFederate SAML 2.0 with Aware, you will need to provide the following information in order to complete the SSO integration.

  • Identity Provider Single Sign-On URL
  • X.509 Certificate

Follow the instructions below to complete the steps for integrating Aware into the customer's PingFederate environment:

Identity Provider Single Sign-On URL and X.509 Certificate information will be generated at the end of this instruction.

 

  1. Log in into your PingFederate Identity Provider Admin View

 

Image 1 of 1

 

  1. Go to SP Connection | Create New
  2. Connection Template: DO NOT USE A TEMPLATE FOR THIS CONNECTION

 

Image 1 of 1

 

  1. Connection Type: BROWSER SSO PROFILES | PROTOCOL SAML 2.0

 

Image 1 of 1

 

  1. Connection Options: BROWSER SSO

 

Image 1 of 1

 

  1. Import Metadata: METADATA: NONE

 

Image 1 of 1

 

General Information:

 

Image 1 of 1

 

 

YOUR_DOMAIN_NAME value is usually your company email domain without .com. For example, our company domain is awarehq.com the value will be awarehq (ex. https://wiretap-prod.auth0.com/login/callback?connection=awarehq AND urn:auth0:wiretap-prod:awarehq). Check with your Customer Success Manager if you are unsure about what value you should use here.

 

  1. Browser SSO: Configure Browser SSO

 

Image 1 of 1

 

  1. Browser SSO > SAML Profiles: SP-INITIATED SSO | SP-INITIATED SLO

 

Image 1 of 1

 

  1. Browser SSO > Assertion Lifetime: MINUTES BEFORE: 5 | MINUTES AFTER: 5

 

Image 1 of 1

 

  1. Browser SSO > Assertion Creation: Configure Assertion Creation

 

Image 1 of 1

 

  1. Browser SSO > Assertion Creation > Identity Mapping: STANDARD: send the AP a known attribute values as the name identifier. The SP will often use account mapping to identify the user locally.

 

Image 1 of 1

 

  1. Browser SSO > Assertion Creation > Attribute Contract:

 

Image 1 of 1

 

  • SAML_SUBJECT: urn:oasis:names:tc:SAML:11:nameid-format:unspecified
  • Extend the Contract: urn:oasis:names:tc:SAML:2.0:attrname-format:basic

 

  1. Browser SSO > Assertion Creation > Authentication Source Mapping:

 

Image 1 of 1

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.