Configuring SSO with PingOne
Netography Configuration
Netography’s SAML and your Identity Provider settings need to be configured in parallel. To start, log in to your Netography account as an administrator.
- Navigate to Settings > Global Security/SSO and enable SAML Single Sign-on:
- Copy the Assertion consumer service (ACS) URL in the SAML Single Sign-On Settings page that appears.. It will be needed as input into Auth0 later.
PingOne Walkthrough
Screenshot dates: 5/2022
- Navigate to Identities > Populations and Create a new Population.
- Create a population for each role you want to your users to use. This example will create a population for administrators. The name we will use Neto_admin.
- Click Save. PingOne will display auto-created information for the new population. Make note of the Population ID, as this value will be used later when configuring the attribute mappings in the Netography Portal
- Repeat for additional roles, such as readonly.
- Next, we will create a new SAML v2.0 application. Navigate to Connection > Applications and click Add Application.
- Name this application Netography and choose SAML Application as the Application Type.
- Click Configure
-
Select/Enter the following:
- Metadata: Manually Enter
- ACS URLs:
<https://idm.netography.com/auth/realms/netography/broker/><shortname>/endpoint
- Entity ID:
<https://idm.netography.com/auth/realms/netography
>
- Next Configure the Attribute Mappings. Click on the Attribute Mappings tab and the edit icon
- Fill out the attribute mappers. These will be used to populate the user information in Netography. Of particular importance is the "group" mapping which will link the the population (role) created above. The following fields can be use:
* saml\_subject - User ID (required - do not change)
* email - Email Address (required)
* firstName - Given Name (required)
* lastName - Family Name (required)
* nickname - Nickname (optional)
* phoneNumber - Primary Phone (optional)
* jobTitle - Title (optional)
* pictureUrl - Photos Link (optional)
* group - Population ID (required)
- Obtain the XML Metadata file. Click the Configuration tab, then Download.
* ![ping0ne metadatafile](./images/configuring-sso-ping0ne-metadatafile.png)
- Finally, Enable the SAML Application
* ![ping0ne enable saml application](./images/configuring-sso-ping0ne-enable-saml-application.png)
Do not forget to assign users to your new Populations.
Netography Post-Configuration
- Return to the Netography portal, and upload the metadata file to Netograph in the Metadata section in the Provider screen in the SAML Single Sign-On Settings page.
- Click Next
- Now configure the User attribute mappers to match the mapper values configured in Auth0 above:
-
Click Next.
-
Next configure the Default user role and role mappers:
- Default user role: This is the role an IDM-authenticated user will default to if the role mappings are not found in the SAML exchange. For security purposes, we recommend setting this value to "readonly", but you may want to set this to "admin" as you are testing your configuration.
- Admin role mappers: Configure these according to the screenshot below. The SAML Attribute Value will be your specific Population ID.
- Click the Save button.
Done! Now your users can log in directly via your identity provider using a new account-specific login URL. The new SSO Login URL can now be found under the Essentials settings in the SAML Single Sign-On Settings page.
The default login will still work for your account administrator, which is not bound to your IDM.
Updated about 1 month ago