PingIdentity Custom IDP
Overview
PingIdentity is an enterprise-grade identity management platform that supports SSO, MFA, directory services, and identity federation. When integrated with LoginRadius as a Custom Identity Provider (IDP) using SAML, PingIdentity helps enable secure and seamless access management for internal teams, partners, or customers.
This setup allows you to:
- Authenticate users using their PingIdentity-managed credentials.
- Extend your identity federation strategy to applications connected via LoginRadius.
- Maintain centralized identity control while leveraging LoginRadius features such as analytics, customer segmentation, and customizable login flows.
Key Features
- Federated Login via SAML 2.0: Authenticate users using PingIdentity with SAML-based federation.
- Secure Certificate-Based Assertion Exchange: This ensures secure validation of login sessions.
- Simplified Configuration: Easily set up and manage PingIdentity as a Custom IDP via the LoginRadius Admin Console.
- Custom Branding: Display a custom-named PingIdentity login button on your login interface.
- Support for Login and Logout Flows: Handle complete SAML SSO sessions, including single logout.
Use Cases
-
Enterprise SSO: Enable employees to log in to your application using their enterprise PingIdentity credentials.
-
Secure B2B Access: Partner organizations can authenticate using their existing PingIdentity-managed identity systems.
-
Regulatory Compliance: Leverage PingIdentity’s security and auditing features to meet compliance standards like HIPAA, GDPR, etc.
Configuration
- Pingidentity Console
- LoginRadius Console
Ping Identity Configuration
Follow this guide to create the SAML application in PingIdentity: Pingidentity Applications - Manually Enter Configuration
Use the following details during setup:
Field | Value |
---|---|
ACS (Assertion Consumer Service) URL | https://<Site Name>.hub.loginradius.com/service/saml/sp/login |
Entity ID | https://<Site Name>.hub.loginradius.com/ |
SLO URL and sign-out URL | https://<LoginRadius Site Name>/service/saml/idp/logout?appname=<SAMLAppName> |
After configuring the application, download the SAML Metadata or X.509 Certificate for use in LoginRadius.
Additional SAML Configuration
Refer to this guide for further SAML settings: Edit Application SAML - PingIdentity
Update the following fields:
Setting | Value |
---|---|
SUBJECT NAMEID FORMAT | urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified |
Assertion Validity Duration | Set the desired duration (in seconds) for which the assertion is valid |
Attribute Mapping
Map the PingOne user attributes to their LoginRadius counterparts:
PingOne Attribute | LoginRadius Attribute |
---|---|
Email Address | saml_subject |
Family Name | lastname |
Given Name | firstname |
After filling in the above configuration, click Save and Close.
LoginRadius Console
-
Log in to the LoginRadius Admin Console
-
Navigate to Custom IDPs:
Go to Authentication > Custom IDPs Or directly: Custom IDPs -
Add PingIdentity IDP:
-
Click Add Custom IDP at the top-right corner.
-
Select the PingIdentity card from the list.
-
-
Fill Configuration Fields:
-
Unique Provider Name: This will appear on the login screen.
-
ID Provider Location: Enter the SAML SSO URL (Assertion Consumer Service endpoint) from the Ping Identity.
-
ID Provider Logout URL: Add the logout URL from the Ping Identity.
-
ID Provider Certificate: Enter the certificate, which should be in the metadata you have downloaded from Ping Identity.
Ensure the certificate is wrapped like:
-
-----BEGIN CERTIFICATE-----
<Your Certificate>
-----END CERTIFICATE-----
- Save Configuration: Click Save to create the PingIdentity IDP. It will now appear in the list of configured IDPs.
Integration Details
After configuring the PingIdentity Custom IDP:
-
The PingIdentity login button will appear on your LoginRadius-hosted login interface.
-
Users can initiate login from the LoginRadius screen and be redirected to PingIdentity for authentication.
-
After a successful login, users are redirected back to your site with a valid session.
-
For API or SDK-based flows, ensure the custom IDP name is passed correctly in the login request and matches the Unique Provider Name set during configuration.