Code42 Integration Guide for PingOne

Creating an SSO connection in PingOne

To allow PingOne to handle single sign-on (SSO) to Code42, add a Security Assertion Markup Language (SAML) application profile.

Steps

  1. In PingOne, go to Applications → Applications and click .

  2. On the Add Application pane, enter a unique Application Name.

  3. In the Application Type section, click SAML Application, then click Configure.

  4. On the SAML Configuration page, enter your SAML details:

    1. Click Manually Enter.

    2. Enter the following connection details using your own Code42 console address.

      You can find your Code42 console address in the address bar of your browser when you sign on to Code42.

      A screenshot that shows the console address in the browser.
      Connection details
      Setting Value

      ACS URLs

      https://Code42-console-address/api/SsoAuthLoginResponse

      Entity ID

      https://Code42-console-address

    3. Click Save, then click the Pencil icon and enter the following configuration details.

      Connection details continued
      Setting Value

      Assertion Validity Duration

      180 or your preferred duration.

      Target Application URL

      https://Code42-console-address/console

      Use the default settings for the rest of the configuration.

    4. Click Save.

  5. On the Attribute Mappings tab, map the PingOne Email Address attribute to mail:

    A screenshot that shows the Email Address PingOne attribute mapped to mail.
    1. Click the Pencil icon, then click Add.

    2. In the Attributes field, enter mail.

    3. In the PingOne Mappings list, select Email Address.

      If the Email Address attribute is unavailable, go to Directory → User Attributes, select the Show disabled attributes checkbox, and click the toggle next to email. Return to the Attribute Mapping tab for your application.

    4. Select the Required checkbox, then click Save.

  6. To enable the application, in its details pane, click the toggle.

  7. On the Configuration tab, click Download Metadata to save the saml2-metadata-idp-***.xml file.