Configuring SAML SSO with RingCentral and PingFederate
Learn how to enable RingCentral sign-on for the PingFederate console (IdP-initiated sign-on) and direct RingCentral sign-on using PingFederate (SP-initiated sign-on).
Before you begin
-
Configure PingFederate to authenticate against an IdP or datastore containing the users that need application access.
-
Populate RingCentral with at least one user for testing access.
-
You must have administrative access to PingFederate and RingCentral.
Export the PingFederate metadata
-
In the PingFederate administrative console, go to System → Protocol Metadata → Metadata Export.
-
Select I am the identity provider then click Next.
-
On the Metadata Mode tab, select Select information to include in metadata manually. Click Next.
-
On the Protocol tab, click Next.
-
On the Attribute Contract tab, click Next.
-
On the Signing Key tab, select a signing certificate. Click Next.
-
Optional: On the Metadata Signing tab, select a certificate to sign the metadata XML file. Click Next.
-
On the XML Encryption Certificate tab, click Next.
-
On the Export & Summary tab, click Export.
-
Save the
metadata.xml
file. -
Click Done.
Configure RingCentral for SSO
-
In the RingCentral administrative console, go to More → Security and Compliance → Single Sign-on.
-
Select Set up SSO by yourself.
-
Upload the PingFederate metadata that you downloaded previously.
-
Select the email attributes to map.
-
In the Certificate Management section, upload the certificate and set it as the primary.
-
Download the RingCentral SP metadata file.
-
Toggle Enable SSO and click Save.
Create a PingFederate SP connection for RingCentral
-
In the PingFederate administrative console, go to Applications → SP Connections → Create Connection.
-
Configure using Browser SSO profile SAML 2.0.
-
Import the RingCentral metadata file that you downloaded previously.
-
Enable the following SAML profiles:
-
IdP-Initiated SSO
-
SP-Initiated SSO
-
-
In Assertion Creation: Attribute Contract, next to SAML_SUBJECT, map the Subject Name Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
-
In Assertion Creation: Authentication Policy Mapping: Attribute Contract Fulfillment, map SAML_SUBJECT to your email attribute.
-
In Protocol Settings: Allowable SAML Bindings, enable POST and REDIRECT.
-
In Credentials: Digital Signature Settings, in the Signing Certificate list, select your signing certificate.
-
Note the SSO Application Endpoint for your newly-created SP connection.
Test the PingFederate IdP-initiated SSO integration
-
Go to the PingFederate SSO Application Endpoint for the RingCentral SP connection.
-
Authenticate with PingFederate.
You’re redirected to RingCentral.
Test the PingFederate SP-initiated SSO integration
-
Go to https://service.ringcentral.com/login/startupSSOLogin.html.
-
Enter your email address and click Submit.
-
After you’re redirected to PingFederate, enter your PingFederate username and password. s+ You’re redirected to RingCentral.