Configuring SAML SSO with Zendesk and PingOne
Learn how to configure SAML SSO with ZenDesk and PingOne.
About this task
The following table details the required and optional attributes to be configured in the assertion attribute contract.
Attribute Name | Description | Required / Optional |
---|---|---|
|
Email Address |
Required |
The following table details the references that are used within this guide that are environment specific. Replace these with the suitable value for your environment.
Reference | Description |
---|---|
|
Zendesk Tenant name |
Create a PingOne Application for Zendesk
-
Sign on to PingOne for Enterprise and go to Applications → Application Catalog.
-
Search for
Zendesk
. -
Click the Zendesk row.
-
Click Setup.
-
In the Signing Certificate list, select the appropriate signing certificate.
-
Review the steps, and make a note of the PingOne SaaS ID, IdP ID, Single Sign-On URL, and Issuer values shown.
-
Click Continue to Next Step.
-
Make sure that ACS URL is set to
https://tenant.zendesk.com/access/saml
. -
Make sure that Entity ID is set to
https://tenant.zendesk.com
. -
Click Continue to Next Step.
-
In the Attribute Mapping section, in the Identity Bridge Attribute or Literal Value column of the SAML_SUBJECTrow, enter
SAML_SUBJECT
. -
Enter the values for the other attributes as required.
-
Click Continue to Next Step.
-
Update the Name, Description, and Category fields as required.
-
Click Continue to Next Step.
-
Add the user groups for the application.
-
Click Continue to Next Step.
-
Review the settings.
-
Copy the Single Sign-On (SSO) URL value to a temporary location.
This is the IdP-initiated SSO URL that you can use for testing.
-
On the Signing Certificate line, click Download.
You’ll use this in the Zendesk configuration.
-
-
On the SAML Metadata line, click Download.
You’ll use this in the Zendesk configuration.
-
Click Finish.
Configure the PingOne IdP connection for Zendesk
-
Sign on to Zendesk as an administrator.
-
Click the Products icon.
-
Click Admin Centre.
-
Click the Security icon.
-
Click Single sign-on.
-
In the SSO Login URL field, enter the URL Location for the SingleSignOnService Location from the PingOne SP metadata that you downloaded from the Zendesk configuration.
For example:
https://sso.connect.pingidentity.com/sso/idp/SSO.saml2?idpid=idpid
-
Open the signing certificate that you downloaded in the PingOne SP configuration and paste the thumbprint into the Certificate fingerprint section.
-
Click Enabled.
-
Click Save.
-
Enable external authentication for Staff members or End users as required.
The following example enables it for Staff members only.
-
Click the Security icon.
-
Click Staff members.
-
Select the External Authentication check box.
-
Click Single sign-on. + Click Save.
-
Test the integration
Choose from:
- For PingFederate IdP-Initiated SSO
-
Go to the Single Sign-On (SSO) URL in the PingOne Application configuration to perform IdP initiated SSO.
For example,
https://PingFederateHostname:PingFederatePort__/idp/startSSO.ping?PartnerSpId=Zendesk
. - For PingOne SP Initiated SSO
-
-
Go to the URL for your Zendesk tenant. For example,
https://tenant.zendesk.com
.Because SSO is only enabled for Staff, you should see a sign on form.
-
Click I am an Agent to initiate SSO.
-