Configuring SAML Single Sign-on
Set up PingFederate
Configurate PingFederate
- Sign in to PingFederate console at
https://service-ip:service-port
, whereservice-ip
andservice-port
refer to the IP address and port of the machine hosting PingFederate server. - In homepage, navigate to
SYSTEM
tab and selectServer
from the left sidebar. - Select
Protocol Settings
, enterBase URL
,SAML 2.0 ENTITY ID,
andSAML 1.X ISSUER/AUDIENCE
, then clickSave
to complete.

Set up simple Password Credential Validators
- In homepage, navigate to
SYSTEM
tab and click onPassword Credential Validators
.

- Click
Create New Instance
. - Enter
INSTANCE NAME
andINSTANCE ID
, selectSimple Username Password Credential Validator
forTYPE
, and clickNext
.

- In
Create Credential Validator Instance
page, clickAdd a new row to 'Users'.

- Enter
Username
,Password
, andConfirm Password
, then clickUpdate
andNext
.

- Review all selected options in
Summary
tab, and clickSave
.
Set up a simple IdP Adapter
- In homepage, navigate to
AUTHENTICATION
tab and click onIdP Adapters
.

- Click
Create New Instance
. - Enter
INSTANCE NAME
,INSTANCE ID,
and selectHTML Form IdP Adapter
forTYPE
. ClickNext
.

- Click
Add a new row to 'Credential Validators'
.

- Select the Password Credential Validator created in the previous stage, that is "Simple MDCore PCV", then click
Update
andNext
.

- Click
Next
onExtended Contract
tab. - In
Adapter Attributes
tab, toggleusername
attribute underPseudonym
column, and clickNext
.

- Click
Next
onAdapter Contract Mapping
tab. - Review all selected options in
Summary
tab and clickSave
to complete.
Set up Signing, Decryption Keys and Certificates
- In homepage, navigate to
SECURITY
tab and selectSigning & Decryption Keys & Certificates
.

- Click
Create New
. - Enter
COMMON NAME
,ORGANIZATION
, andCOUNTRY
, along with any other necessary information, then clickNext
.

- Review all selected options in
Summary
tab and clickSave
to complete.
Set up Service Provider connections
- In homepage, go to
APPLICATIONS
tab and chooseSP Connections
.

- Select
Create Connection
. - Select
DO NOT USE A TEMPLATE FOR THIS CONNECTION
and then clickNext
. - In
Connection Type
phase, toggleBROWSER SSO PROFILES
and chooseSAML 2.0
forPROTOCOL
. PressNext
.

- In
Connection Options
phrase, selectBROWSER SSO
and then clickNext
.

- In
Import Metadata
phase, selectNONE
forMETADATA
subtab and pressNext
.

- In
General Info
section, enterPARTNER'S ENTITY ID (CONNECTION ID)
andCONNECTION NAME
, then clickNext
.
PARTNER'S ENTITY ID
, 'md_core' in this case, will later be used to configure Custom entity ID
in MetaDefender Core.

- In
Browser SSO
phrase, selectConfigure Browser SSO
.

- In
SAML Profiles
phrase, checkSP-INITIATED SSO
underSingle Sign-On (SSO) Profiles
column. PressNext
once you are finished.

- Select
Next
inAssertion Lifetime
phase. - In
Assertion Creation
phase, selectConfigure Assertion Creation
.

- In
Identity Mapping
phrase, chooseSTANDARD
and pressNext
.

- In
Attribute Contract
phase, navigate toExtend the Contract
, complete the contract needed by MetaDefender Core, using 'username' as a sample. Select the basic format forAttribute Name Format
, then clickAdd
followed byNext
.

- In
Authentication Source Mapping
phase, selectMap New Adapter Instance
.

- In
Adapter Instance
phase, choose the appropriate IdP Adapter forADAPTER INSTANCE
and then clickNext
.

- In
Mapping Method
phase, selectUSE ONLY THE ADAPTER CONTRACT VALUES IN THE SAML ASSERTION
, then pressNext
.

- In
Attribute Contract Fulfillment
phase, choose 'Adapter' forSource
column and 'username' forValue
column, then clickNext
.

- Press
Next
onIssuance Criteria
phrase. - Examine all chosen options in
Summary
, then selectDone
andNext
. - Return to
Assertion Creation
phrase, examine all chosen options inSummary
, and then clickDone
andNext
. - In
Protocol Settings
phase, selectConfigure Protocol Settings
.

- Check the box under
Default
column, enter 0 inIndex
column, select POST forBinding
, and input the address of the machine hosting MetaDefender Core inEndpoint URL
column, then clickAdd
andNext
.

- In
Acceptable SAML Bindings
phase, select only 'POST' and 'REDIRECT' choices, then clickNext
.

- Press
Next
on the phrases forSignature Policy
andEncryption Policy
. - Examine all chosen options in
Summary
and clickDone
. - Select
Next
onBrowser SSO
. - Examine all chosen options in
Summary
, then selectDone
andNext
. - In
Credentials
phase, selectConfigure Credentials
.

- In
Digital Signature Settings
phase, go toSIGNING CERTIFICATE
, choose the signing signature configured in the earlier step, activate the optionINCLUDE THE CERTIFICATE IN THE SIGNATURE <KEYINFO> ELEMENT
, and then clickNext
.

- Examine all chosen options in
Summary
phrase, then pressDone
. - Return to
Credentials
tab and selectNext
. - Examine all chosen options in
Activation & Summary
phrase, verify that the connection is active, and then clickSave
to finish.

Export Identity Provider metadata
- Go to
APPLICATIONS
and click onSP Connections
on the left sidebar. - Go to the connection established in the prior step, click
Select Action
link located inAction
column, and chooseExport Metadata
.

- Choose the prior signing certificate, then press
Next
.

- Examine all chosen options in
Summary
and selectExport
.

- Save the exported file as 'metadata.xml', and then press
Done
.
The 'metadata.xml' file will be used in the upcoming phase to set up Identity Provider
in MetaDefender Core.
Configure SAML in MetaDefender Core
- Sign in to MetaDefender Core.
- In the dashboard, click on
User Management
in the left sidebar. - On
User Management
page, selectDirectories
tab and clickAdd Directory
in the top right corner.

- In
Add Directory
page, select OIDC asDirectory type
, and enter a name for the new directory, such as MDCORE-SAML. - Click
Submit JSON
and upload the 'metadata.xml' file exported in the earlier stage.

- Navigate to
Service Provider
, toggleUse custom entity ID
and fill inCustom entity ID
with the partner's entity ID configured in PingFederate. That is 'md_core' for this case. - Enter value or
Host or IP
, clickCopy
and save it in redirect_url.
redirect_url will serve to establish the value for Endpoint URL
in the final configuration phase in PingFederate.
- Establish
User Identified by
using ${username}. - Choose
Default role
and select the appropriate role for the logged-in user. - Press
Add
when finished.

- In
User Management
page, toggle the new directory, MDCORE-SAML, in this instance. A confirmation dialog box will pop up to verify the action. After clickingEnable
, all sessions will end instantly.

Complete configuration in PingFederate
- Access the PingFederate management console.
- Go to
APPLICATION
and chooseSP Connections
from the left sidebar. - In
Signature Policy
, setAlways Sign Assertion
to 'true'.

- Go to
Assertion Consumer Service URL
and select the link next toEndpoint
.

- Click
Edit
.

- Modify the URL located below
Endpoint URL
to the value found in redirect_url, then clickUpdate
andSave
.

Test the integration
- On the home screen of MetaDefender Core, click
Login
; the user is redirected to PingFederate Sign-on page.

- Sign in using the account registered with PingFederate.
- If everything goes well, MetaDefender Core dashboard is displayed with the user identity in the top right corner.

- Otherwise, access backup login page at
<mdcore-host>#/public/backuplogin
for trouble shooting.
Was this page helpful?
On This Page
Configuring SAML Single Sign-onSet up PingFederateConfigurate PingFederateSet up simple Password Credential ValidatorsSet up a simple IdP AdapterSet up Signing, Decryption Keys and CertificatesSet up Service Provider connectionsExport Identity Provider metadataConfigure SAML in MetaDefender CoreComplete configuration in PingFederateTest the integration