Skip to main content

Ping Federate

Ping Federate

Configure Single Sign-On (SSO) with Ping Federate to enable seamless authentication for your ept AI users using their existing identity federation credentials.

Back to Integrations Overview

Overview

The Ping Federate SSO integration enables your ept AI users to:

  • Sign in using their existing Ping Federate-managed credentials
  • Access ept AI without creating separate accounts
  • Benefit from Ping Federate's enterprise identity federation features
  • Use existing identity federation policies and security controls

This integration supports SAML 2.0 authentication and integrates with Ping Federate's comprehensive identity federation capabilities.

Prerequisites

Before setting up the Ping Federate SSO integration, ensure you have:

  • Ping Federate: Active Ping Federate server configured
  • Admin Access: Ping Federate administrator access
  • ept AI Setup: Your ept AI instance configured and ready
  • Network Access: Ability to reach the Ping Federate server from ept AI

Setup Instructions

Step 1: Configure SP Connection in Ping Federate

  1. Create New SP Connection:

    • Log into Ping Federate admin console
    • Navigate to SP Connections
    • Click "Create New SP Connection"
  2. Configure Connection Settings:

    • Connection Type: SAML 2.0
    • Connection Name: "ept AI"
    • Description: "AI-powered chatbot platform"
    • Click "Next"
  3. Configure SAML Settings:

    • Entity ID: https://your-ept-ai-domain.com/saml/metadata
    • ACS URL: https://your-ept-ai-domain.com/saml/acs
    • Signing Certificate: Upload ept AI's signing certificate
    • Click "Next"
  4. Configure Attribute Mapping:

    • Map Ping Federate attributes to ept AI user properties:
    email -> user.email
    firstName -> user.firstName
    lastName -> user.lastName
    groups -> user.groups

Step 2: Configure ept AI for Ping Federate SSO

  1. Access SSO Settings:

    • Log into your ept AI admin dashboard
    • Navigate to Configuration > Users > SSO Settings
    • Click "Configure SSO"
    • Select "Ping Federate" as the SSO provider
  2. Configure SAML Settings:

    SSO Provider: Ping Federate
    Entity ID: https://your-ept-ai-domain.com/saml/metadata
    ACS URL: https://your-ept-ai-domain.com/saml/acs
    Ping Federate URL: https://your-ping-federate-server.domain.com
    Signing Certificate: [Export from Ping Federate]

Step 3: Test and Activate SSO

  1. Test Configuration:

    • Use Ping Federate's built-in SAML testing tools
    • Verify attribute mapping and user provisioning
    • Test sign-in flow from Ping Federate to ept AI
  2. Activate Integration:

    • Enable SSO in ept AI admin settings
    • Configure fallback authentication options
    • Set up user provisioning rules

Configuration Options

Authentication Settings

  • SAML 2.0: Full SAML 2.0 protocol support
  • Force Authentication: Require re-authentication for sensitive operations
  • Session Management: Configure session timeouts and renewal
  • Logout: Configure single logout (SLO) behavior

User Provisioning

  • Just-in-Time (JIT): Automatically create users on first sign-in
  • Attribute Mapping: Map Ping Federate attributes to ept AI user properties
  • Group Synchronization: Sync Ping Federate groups to ept AI roles
  • User Updates: Automatically update user information from Ping Federate

Security Settings

  • Certificate Management: Upload and manage SAML signing certificates
  • Encryption: Enable SAML response encryption
  • Audit Logging: Log all SSO authentication events
  • Access Control: Configure IP restrictions and access policies

Use Cases

Enterprise Authentication

  • Centralized Identity: Use existing Ping Federate-managed accounts for ept AI access
  • Security Compliance: Meet enterprise security and compliance requirements
  • User Management: Leverage Ping Federate's user lifecycle management
  • Access Control: Use Ping Federate policies for conditional access

Identity Federation

  • Multi-Domain Support: Support organizations with multiple identity domains
  • Federation Policies: Apply existing identity federation policies
  • Cross-Domain Access: Enable access across organizational boundaries
  • Policy Enforcement: Apply existing federation policies

Best Practices

Security Configuration

  1. Certificate Management: Regularly rotate SAML signing certificates
  2. Attribute Security: Only request necessary user attributes
  3. Access Policies: Configure appropriate access policies in Ping Federate
  4. Audit Monitoring: Monitor SSO authentication logs regularly

Integration Management

  1. Testing: Regularly test the SSO integration
  2. Documentation: Maintain up-to-date configuration documentation
  3. Monitoring: Monitor integration health and performance
  4. Updates: Keep both Ping Federate and ept AI updated

Troubleshooting

Common Issues

Authentication Failures:

  • Verify SAML certificate is valid and not expired
  • Check attribute mapping configuration
  • Verify ACS URL and Entity ID match exactly
  • Review Ping Federate SP connection configuration

User Provisioning Issues:

  • Check attribute mapping in both Ping Federate and ept AI
  • Verify user attributes are being sent correctly
  • Review user creation and update rules
  • Check group synchronization settings

Session Management:

  • Verify session timeout configurations
  • Check single logout (SLO) configuration
  • Review browser cookie settings
  • Test session renewal process

Getting Help