Ping Identity PingOne (SAML)
Ping Identity offers a PingOne SSO solution that integrates with BeyondTrust Remote Support. It can be set up for Representatives, Public Portals, or both. This guide shows how to configure PingOne and Remote Support integrations.)
Configure PingOne for representatives
Configuring the PingOne integration with BeyondTrust Remote Support for Representatives requires steps in both applications. Start in PingOne, and follow these steps:
-
Log in to PingOne.
-
Navigate to the Application Catalog.
-
Search for BeyondTrust. The search results show the various BeyondTrust applications and their configuration status.
-
Click the + icon at the end of the row for BeyondTrust - Remote Support.
-
Enter your instance name.
-
Click Next.
-
On the Map Attributes page, complete the configuration for the Groups attribute.
Remote Support requires one or more string values with multiple values separated by a configurable delimiter. It is possible to map a PingOne User Attribute or another method, but that is beyond the scope of this guide. We must configure an advanced expression for the groups attribute. Assign a static value, surrounded by double quotes, that corresponds to an existing group in Remote Support. In this example, team_a is used. -
Click Save, then Next.
-
Access Control Groups in PingOne can be used to limit access to the Application. Leave the page empty for now and click Save.
-
On the Connection Details page, click Download Metadata.
-
Continue the configuration in BeyondTrust Remote Support.
Configure representatives for PingOne
Follow these steps to create a new SAML Provider for Ping Identity PingOne.
-
Log in to BeyondTrust Remote Support.
-
Click Users & Security on the left menu, and then click the Security Providers tab.
-
Click Add and select SAML for Representatives.
-
Enter a name to identify this provider, such as SAML For Representatives.
-
Under Identity Provider Settings, click UPLOAD IDENTITY PROVIDER METADATA.
-
Browse to the metadata file downloaded from PingOne and select it.
-
The Single Sign-On Service URL and the Entity ID are populated by the metadata file. Leave the SSO URL Protocol Binding as HTTP POST.
-
Select the Available Groups and Default Group Policy.
-
Click SAVE at the top of the screen.
PingOne supports Identity Provider (IdP) initiated Single Sign-On, via a direct link or the Apps portal for Users. Remote Support supports Service Provider (SP) initiated Single Sign-On. On the login page, click Use SAML Authentication for SP initiated SSO.
SAML Users are managed by the Identity Provider, which is PingOne.
Configure PingOne for public portals
Configuring the PingOne integration with BeyondTrust Remote Support Portals requires steps in both applications. Start in PingOne, and follow these steps:
-
Log in to PingOne.
-
Navigate to the Application Catalog.
-
Search for BeyondTrust. The search results show the various BeyondTrust applications and their configuration status.
-
Click the + icon at the end of the row for BeyondTrust - Remote Support Public Portals.
-
Enter your instance name.
-
Click Next.
-
On the Map Attributes page, click Next.
-
Access Control Groups in PingOne can be used to limit access to the Application. Leave the page empty for now and click Save.
-
On the Connection Details page, click Download Metadata.
-
Continue the configuration in BeyondTrust Remote Support.
Configure public portals for PingOne
Follow these steps to create a new SAML Provider for Ping Identity PingOne.
-
Log in to BeyondTrust Remote Support.
-
Click Users & Security on the left menu, and then click the Security Providers tab.
-
Click Add and select SAML for Public Portals.
-
Enter a name to identify this provider, such as SAML-For-Public-Portals.
-
Under Identity Provider Settings, click UPLOAD IDENTITY PROVIDER METADATA.
-
Browse to the metadata file downloaded from PingOne and select it.
-
The Single Sign-On Service URL and the Entity ID are populated by the metadata file. Leave the SSO URL Protocol Binding as HTTP POST.
-
Leave the User Attribute Settings at their defaults.
-
Click SAVE at the top of the screen.
-
Click Public Portals on the left menu, and then click Public Sites.
-
Click the pencil icon to edit the selected portal.
-
Check Require SAML Authentication.
-
Click SAVE at the top of the screen.
PingOne supports Identity Provider (IdP) initiated Single Sign-On, via a direct link or the Apps portal for Users. Remote Support supports Service Provider (SP) initiated Single Sign-On. The public portal enabled for SAML authentication displays a login button.
Once authenticated via PingOne, the user will see the Your Name field populated.
Updated 5 days ago