Configuring SAML SSO with Coupa and PingFederate
Learn how to enable Coupa sign-on from a PingFederate URL (IdP-initiated sign-on) and direct Coupa sign-on using PingFederate (SP-initiated sign-on).
Before you begin
-
Configure PingFederate to authenticate against an IdP or datastore containing the users requiring application access.
-
Populate Coupa with at least one user to test access.
-
You must have administrative access to PingFederate and Coupa.
Download the Coupa metadata
-
Sign on to your Coupa Admin organization as an administrator.
-
Go to
https://your_site.coupahost.com/administration/security
. -
Select the Sign in using SAML check box.
-
Click the Download and import SP metadata link.
-
Save the Coupa metadata.
Create a PingFederate SP connection for Coupa
-
Sign on to the PingFederate administrative console.
-
Create an SP connection for Coupa in PingFederate using the Coupa metadata:
-
Configure using Browser SSO profile SAML 2.0.
-
Enable the following SAML Profiles:
-
IdP-Initiated SSO
-
SP-Initiated SSO
-
-
In Assertion Creation: Authentication Source Mapping: Attribute Contract Fulfillment, map SAML_SUBJECT to the attribute containing a user’s email address.
-
In Protocol Settings: Allowable SAML Bindings, enable POST.
-
In Credentials: Digital Signature Settings select the PingFederate signing certificate.
-
-
-
Save the configuration.
-
Export the signing certificate.
-
Export the metadata file.
Add the PingFederate IdP Connection to Coupa
-
Sign on to your Coupa Admin organization as an administrator.
-
Go to
https://your_site.coupahost.com/administration/security
. -
Make sure that the Sign in using SAML check box is selected.
-
In the Upload IdP metadata section, click Choose File.
-
Select the PingFederate metadata file and import it.
-
In the Certificate field, upload the PingFederate signing certificate.
-
Click Save.
-
Click the Users tab and edit the users who will use SAML authentication.
-
Set Single Sign-On ID to the value users will use to sign on, for example, their email address.
-
Set Authentication method to SAML.
-
Click Save.