Configuring SAML Single Sign-on
Create SAML directory in MetaDefender Core
- Sign in to MetaDefender Core.
- In the dashboard, click on
User Management
in the left sidebar. - On
User Management
page, selectDirectories
tab and clickAdd Directory
in the top right corner.

- In
Add Directory
page, selectSAML
asDirectory type
, and enter a name for the new directory, such as MDCore-SAML. - In
Service Provider
section, enableUse custom entity ID
option and enter the ID, such as MDCORE-PINGONE-SAML, then store it in entity_id. - Enter
Host or IP
where MDCore is hosted, for this example use https://127.0.0.1:8008. - Copy the string generated under
Login URL
and store it as reply_uri.

Create and configure SAML application in PingOne
- In the PingOne Overview page, navigate to
Connections
on the sidebar.

- Click the plus button to add a new application.

- Enter the application name, MDCore-SAML as an example, choose
SAML Application
forApplication Type
, and clickConfigure
.

- Select
Manually Enter
for SAML Configuration, fill inACS URLs
with reply_uri,Entity ID
with entity_id, and clickSave
.

- Select
Configuration
tab, navigate toIDP Metadata URL
, copy the link below, and store it in metadata_url.

- Select
Attribute Mappings
tab and click Edit button.

- On
Edit Attribute Mappings
page, clickAdd
to create a new mapping.

In this step, we create a mapping from the key name used by MetaDefender Core to the one exported by PingOne. For example, we set given_name
mapped to Given Name
from PingOne. Later, given_name
is utilized by MetaDefender Core to identify the logged-in user..
- Enter the attribute name,
given_name
in this example, select the itemGiven Name
inPingOne Mappings
, enableRequired
option, and clickSave
to complete.

- Enable the new application in PingOne.

Complete configuration in MetaDefender Core
- Switch back to MetaDefender Core. Under
Identity Provider
, clickFetch URL
, paste the value of metadata_url into the box below, clickOK
, and wait a moment for MetaDefender Core to check and set PingOne as its IdP.

- Under
Service Provider
, fill in ${given_name} in the box labeledUser identified by
.

- Select
Default role
option, choose the appropriate role to assign to users underUser Role
, and clickAdd
to complete the settings in MetaDefender Core.

- On
User Management
page, toggle the new directory, MDCORE-SAML in this example. A dialog box will appear to confirm the action. OnceEnable
is clicked , all sessions will expire immediately.

Test the integration
- On the home screen of MetaDefender Core, click
Login
; the user is redirected to PingIdentity login page.

- Sign in using the account registered with PingIdentity.
- If everything goes well, MetaDefender Core dashboard is displayed with the user identity in the top right corner.

- Otherwise, access backup login page at
<mdcore-host>#/public/backuplogin
for trouble shooting.
Test IdP-initiated login
- Sign in to PingOne management page.
- In the left sidebar, click on
Connections
, thenApplications
. - Select the SSO directory from which IdP-initiated login is enabled, such as MDCore-SAML in this example.

- In the right sidebar, click on
Configuration
tab. Copy the URL underInitiate Single Sign-On URL
.

- Paste the URL into your browser and try to sign in.

- If everything goes well, MetaDefender Core dashboard is displayed with the user identity in the top right corner.

- Otherwise, access backup login page at
<mdcore-host>#/public/backuplogin
for trouble shooting.
Was this page helpful?