Integrate PingFederate with Azure AD
Level: Eptura Implementation team / Customer IT team
Eptura supports the integration with PingFederate and this article details how to configure the SSO. This article is written for Administrators and assumes familiarity with Ping and basic identity management concepts.
Contents
- Prerequisites
- Step 1. Integrate PingFederate with Azure AD
- Step 1.1 Create Azure EntraID App Registration for PingFederate Integration (Customer Team)
- Step 1.2 Get Redirect URIs from PingFederate (Eptura Implementation Team)
- Step 1.3 Create an IDP connection in PingFederate (Eptura Implementation Team)
- Step 1.4 Optional - Cluster Management (Eptura Implementation Team)
- Step 1.5 Set Ping redirect URI in Azure Ping application (Customer Team)
- Step 1.6 Redirect incoming requests to IDP in PingFederate (Eptura Implementation Team)
- Step 1.7 Add access token mapping in PingFederate (Eptura Implementation Team)
- Step 2. Sign in Eptura using a SSO user (Customer Team)
- Step 3. Integrate SCIM with User Directory (Customer Team)
- Step 4. User Access to Eptura Applications
Prerequisites
Before configuring SCIM-based provisioning for Eptura, make sure you have an Azure AD to configure an IdP connection on PingFederate to enable the SSO login. Additionally, your Super Admin must be defined in the Azure AD with their First Name, Last Name and Email Address properties completed.
Step 1. Integrate PingFederate with Azure AD
Below are the steps for PingFederate integration.
Step 1.1 Create Azure EntraID App Registration for PingFederate Integration (Customer Team)
- Sign in to Microsoft Azure https://azure.microsoft.com/en-us/
Primary Domain Name
- From the menu, navigate to Microsoft EntraID > Overview.
- Copy the Primary domain name and paste this into a text editor as we will use this later in the steps.
App Registrations
- From the menu, navigate to Manage > App Registrations.
- Click the New Registration button and the Register an application screen displays.
- In the Name field, enter the name for this app that will integrate this Azure instance with Eptura company’s Ping instance. For example PingFederation Integration.
- For the "Who can use this application or access this API? option, select Accounts in this organizational directory only - Single tenant.
- From the Redirect URI (optional) drop-down, select Web and note that the URI value will be set later on.
- Click the Register button and the application is registered.
Application (client) ID
- From the App registrations > Overview.
- Copy the Application (client) ID and paste this into a text editor as we will use this later in the steps.
Endpoints
- Click the Endpoints tab and the Endpoints form displays.
- Browse the list to find OpenId Connect metadata document.
- Copy the value and don't include the characters after /v2.0/ and paste this into a text editor as we will use this later in the steps.
- Click the X icon to close the Endpoints form.
Certificates & secrets
- From the menu, select Manage > Certifications & secrets.
- Click New client secret and the Add a client secret form displays.
- In the Description field, enter a short description. For example pingsecret1.
- From the Expires drop-down, set the expiration to 730 days (24 months).
- Click the Add button and the application credentials are saved.
A secret key will be generated; make sure you copy the secret key's value. We recommend that you keep a copy of the secret key in a secure location.
Remember to note the expiry date as this secret needs to be refreshed 30 days before the expiry and share this with Eptura.
Provide the following information to the Eptura Implementation team:
- Primary domain name
- Application (client) ID
- OpenId Connect metadata document
- Client secret value
Optional - Test the sync with the Eptura Platform Tenant
If you want to test with a few users first, before syncing all AD users with Eptura.
- From the main menu, click Enterprise applications.
- Click the application name. For example PingFederateIntegration.
- From the menu, click Manage > Properties.
- For the Assignment required, click Yes.
When this is set to No, then all the AD Users will sync with Eptura.
Step 1.2 Get Redirect URIs from PingFederate (Implementation Team)
This step is performed by the Eptura Implementation Team.
Step 1.3 Create an IDP connection in PingFederate (Implementation Team)
This step is performed by the Eptura Implementation Team.
When done, Eptura provides the IdP Connection Redirect URI to the customer.
Step 1.4 Optional - Cluster Management
This optional step is performed by the Eptura Implementation Team.
Step 1.5 Set Ping redirect URI in Azure Ping application (Customer Team)
- Sign in to Microsoft Azure https://portal.azure.com/
- Navigate to Microsoft EntraID.
- From the menu, select Manage > App Registrations.
- Click the All applications tab.
- Select the PingFederate application name you created.
- From the menu, select Authentication.
- Click the + Add a platform button and the Configure platforms form displays.
- Click the Web tile and the Configure Web form displays.
- In the Redirect URIs field, paste in the IdP Connection Redirect URI. From Redirect URI (above).
- Click the Configure button.
Step 1.6 Redirect incoming requests to IdP in PingFederate (Implementation Team)
This step is performed by the Eptura Implementation Team.
Step 1.7 Add access token mapping in PingFederate (Implementation Team)
This step is performed by the Eptura Implementation Team.
Step 2. Sign in Eptura using a SSO user (Customer Team)
Learn how to sign in to Eptura - Authentication Methods using an SSO user or using Form Authentication where your user was created manually.
Step 3. Integrate SCIM with User Directory (Customer Team)
Your IdP gets connected to the SCIM service, using the SCIM URL and SCIM token. When connected, the SCIM service will automatically import all user accounts that are in the your IdP. The attributes of the users in you IdP need to be mapped to SCIM. After the initial synchronization, additional synchronizations happen on a schedule of every 40 minutes. See the article, Configure SCIM provisioning for Microsoft Entra ID
Step 4. User Access to Eptura Applications
Users created in Okta are synchronized to Eptura as a person, you can change the access the user has to the Eptura's Product Applications, see Add, Edit, or Delete a Group.