Ping Identity PingOne (SAML)
Ping Identity offers a PingOne SSO solution that integrates with BeyondTrust Privileged Remote Access. This guide shows how to configure PingOne and Privileged Remote Access integrations.
Configure PingOne
Configuring the PingOne integration with BeyondTrust Privileged Remote Access requires steps in both applications. Start in PingOne, and follow these steps:
- Log in to PingOne.
- Navigate to the Application Catalog.
- Search for BeyondTrust. The search results show the various BeyondTrust applications and their configuration status.
- Click the + icon at the end of the row for BeyondTrust - Privileged Remote Access.
- Enter your instance name.
- Click Next.
- On the Map Attributes page, complete the configuration for the Groups attribute. Privileged Remote Access requires one or more string values with multiple values separated by a configurable delimiter. It is possible to map a PingOne User Attribute or another method, but that is beyond the scope of this guide. We must configure an advanced expression for the groups attribute. Assign a static value, surrounded by double quotes, that corresponds to an existing group in Privileged Remote Access. In this example, team_a is used.
- The Map Attributes page should look like the image below.
- Click Save, then Next.
- Access Control Groups in PingOne can be used to limit access to the Application. Leave the page empty for now and click Save.
- On the Connection Details page, click Download Metadata.
- Continue the configuration in BeyondTrust Privileged Remote Access.
Configure Privileged Remote Access
Follow these steps to create a new SAML Provider for Ping Identity PingOne.
- Log in to BeyondTrust Privileged Remote Access.
- Click Users & Security on the left menu, and then click the Security Providers tab.
- Click Add and select SAML.
- Enter a name to identify this provider, such as SAML2.
- Under Identity Provider Settings, click UPLOAD IDENTITY PROVIDER METADATA.
- Browse to the metadata file downloaded from PingOne and select it.
- The Single Sign-On Service URL and the Entity ID are populated by the metadata file. Leave the SSO URL Protocol Binding as HTTP POST.
- Select the Available Groups and Default Group Policy.
- Click SAVE at the top of the screen.
PingOne supports Identity Provider(IdP) initiated Single Sign-On, via a direct link or the Apps portal for Users. Privileged Remote Access supports Service Provider(SP) initiated Single Sign-On. On the login page, click Use SAML Authentication for SP initiated SSO.
SAML Users are managed by the Identity Provider, which is PingOne.
Updated 10 days ago