Ping Identity (PingID) is the identity as a security platform provider. It is a cloud-based authentication service provider and supports Security Assertion Markup Language (SAML). You can use Appsmith to integrate with Ping Identity using SAML configuration for authentication.
{% hint style="info" %} Security Assertion Markup Language (SAML) is available only in the enterprise edition for self-hosted instances, and only the Superuser of your Appsmith Instance can set up SAML. {% endhint %}
Log into your PingOne account. (Please create an account if you don’t have one). On the dashboard, you can see the Home menu, click on home and see the environment listing.
- Click on the Add Environment button.
- Click on the Build your own Solution, select
PingOne SSO
, and click Next.
- Click on the Connections available on the left sidebar and click Applications. Create a new application by clicking on
(+)
. - Fill in the details:
- Name - Provide a meaningful name
- Description - Provide a description
- Select Application Type as SAML Application.
- Click Save, and you’ll see a configuration overlay and Configure button. Click on Configure button to complete the SAML configuration.
- You can choose one of the available options to configure SAML.
{% embed url="https://youtu.be/iMAOqRo2KuI" %} How to Configure SAML For Ping Identity as IdP? {% endembed %}
Ping Identity provides several ways to set up SAML integration. For configuring integration with Appsmith, select Manually Enter for Provide Metadata. Add the details as per the below mapping:
- Add Redirect URL (available on Appsmith) to ACS URLs field.
- Add Entity URL (available on Appsmith) to the Entity ID field.
- Click Save to create an application with SAML Configuration.
- You’ll see the application is created with SAML configuration as below
To complete the SAML setup, you’ll have to register PingID as a provider on the Appsmith platform. Follow the instructions listed below to complete this step:
There are many ways to register the identity provider on Appsmith and complete the SAML Configuration.
Navigate to Admin Settings >> Authentication >> Click Enable. Choose the one that best suits you:
SAML metadata is an XML document that provides information required for interaction with a SAML-enabled identity or service provider. The Metadata URL is the URL metadata for SAML configuration hosted on a remote server.
{% hint style="info" %} Metadata URL is the quickest and most recommended way to set up SAML. {% endhint %}
- Navigate to Environment >> Select Environment_Name >> Click Connections >> Select Application_Name >> Click Configuration Tab >> copy IDP Metadata URL.
- Add the copied IDP Metadata URL to the Metadata URL field on Appsmith and click
SAVE & RESTART
button to save the configuration.
If you don’t have a Metadata URL but have a raw SAML Metadata XML document, you can choose XML to configure SAML.
- Click XML, add the raw XML in the
Metadata XML
field, and click theSAVE & RESTART
button to save the configuration.
You can also configure SAML by providing the identity provider(IdP) data. If you have Identity provider’s data like X509 Public Certificate, Email, and more, you can choose this option to configure SAML.
- Navigate to Environment >> Select Environment_Name >> Click Connections >> Select Application_Name >> Click Configuration Tab >> Click Download Metadata.
- Add the content of the tags as per the below mapping table on the Appsmith platform:
Appsmith Field Name | Metadata XML Tag |
---|---|
Entity ID | <EntityDescriptor/> entityID attribute |
Single Sign-On URL | <SingleSignOnService/> Location attribute |
X509 Public Certificate | <X509Certificate/> |
<saml:Attribute NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" Name="user.email" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"/> |
Once the server restarts with new configurations, you will see a screen showing the message ‘Authentication Successful!’.
You’ll see a login screen with the button SIGN IN WITH SAML SSO
.