The following table details the required and optional attributes to be configured in the assertion attribute contract.

Attribute Name Description Required / Optional

urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress

Email address for user

Required

The following table details the references that are used within this guide which are environment specific. Replace these with the suitable value for your environment.

Reference Description

<tenant>

BambooHR Tenant name

  1. Create the PingFederate service provider (SP) connection for BambooHR.
    1. Sign on to the PingFederate administrative console.
    2. Using the metadata from https://<tenant>.bamboohr.com/saml/sp_metadata.php, create an SP connection in Ping Federate:
      • Configure using Browser SSO profile SAML 2.0
      • Enable the IdP-Initiated SSO SAML profile.
      • Enable the SP initiated SSO SAML profile.
      • In Assertion Creation > Attribute Contract, set the Subject Name Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
      • In Assertion Creation > Attribute Contract Fulfillment, map the attribute SAML_SUBJECT to the attribute mail.
      • In Protocol Settings > Allowable SAML Bindings, enable Redirect.
    3. Export the metadata for the newly-created SP connection.
    4. Export the signing certificate public key.
      Screen capture illustrating the Applications > SP Connections page on the PingFederate administrative console.
  2. Configure the PingFederate identity provider (IdP) connection for BambooHR.
    1. Sign on to BambooHR as a Full Admin administrator user.
    2. On the Settings page, click Apps.
      Screen capture illustrating the Apps Settings section of the BambooHR website.
    3. On the SAML Single Sign-On application published by BambooHR line, click Install.
      Screen capture illustrating the SAML SSO application available for installation.
    4. In the SSO Login URL field, enter the URL Location for SingleSignOnService Location retrieved from the from the PingFederate SP metadata that you downloaded from the BambooHR configuration.

      https://<PingFederateHostname>:<PingFederatePort>/idp/SSO.saml2

    5. In a text editor, open the signing certificate that you downloaded in from PingFederate and paste the contents into the x.509 Certificate field.
      Screen capture illustrating the SAML SSO Login URL and the x.509 Certificate metadata.
    6. Click Install.

      Your configuration is complete.

      From this point BambooHR will redirect to the configured IdP for authentication for all new sessions. You should complete testing in a private or incognito browser session while keeping the original admin session active. This allows you to change settings or remove the configuration if the integration testing fails.

      Screen capture illustrating the SAML SSO application installed on the BambooHR website.
  3. Test the integration:
    • PingFederate IDP Initiated SSO:
      1. Go to the SSO Application in the PingFederate Application configuration to perform IdP-initiated SSO, such as https://<PingFederateHostname>:<PingFederatePort>/idp/startSSO.ping?PartnerSpId=BambooHR-SAML.

        Screen capture illustrating the IdP SSO sign-on window.
      2. Go to the SSO Application Endpoint in the BambooHR configuration

        Screen capture illustrating the SSO Application endpoint in the BambooHr configuration.
    • PingFederate SP-initiated SSO:

      Go to the URL for your BambooHR tenant: https://<tenant>.bamboohr.com

      Screen capture illustrating the BambooHR tenant URL.