Configuring SAML SSO with Workato and PingFederate
Learn how to enable Workato sign-on from the PingFederate console (IdP-initiated sign-on) and direct Workato sign-on using PingFederate (SP-initiated sign-on).
Before you begin
-
Configure PingFederate to authenticate against an identity provider (IdP) or datastore containing the users requiring application access.
-
Populate Workato with at least one user to test access.
-
You must have administrative access to PingFederate.
Create the Workato metadata
-
In PingFederate, create a service provider (SP) connection for Workato:
-
Configure using Browser SSO profile SAML 2.0.
-
Set Partner’s Entity ID to
https://www.workato.com/saml/metadata?id=Workato ID
.This value is provided by Workato on the Tools → Team → Settings tab.
-
Enable the following SAML profiles.
-
IdP-Initiated SSO
-
SP-Initiated SSO
-
-
In Assertion Creation: Authentication Source Mapping: Attribute Contract Fulfilment, map the SAML_SUBJECT to your email attribute.
-
In Protocol Settings: Assertion Consumer Service URL, set Binding to POST and set Endpoint URL to
https://www.workato.com/saml/consume/
. -
In Protocol Settings: Allowable SAML Bindings, enable POST.
-
In Credentials: Digital Signature Settings, select the PingFederate Signing Certificate.
Note the metadata URL for the newly-created Workato SP connection.
-
Add the PingFederate connection to Workato
-
Sign on to the Workato console as an administrator.
-
Select Tools in the left navigation pane.
-
Click the Members tab.
-
Select Team.
-
Select the Settings tab.
-
Enter a Team name for the team or company.
-
In the Authentication method list, select SAML based SSO.
-
In the SAML_provider list, select Other.
-
Enter the Metadata URL value for the Workato SP connector in PingFederate.
Test the PingFederate IdP-initiated SSO integration
-
Go to the PingFederate SSO Application Endpoint for the Workato SP connection.
-
Authenticate with PingFederate.
You’re redirected to your Workato domain.