• Configure PingFederate to authenticate against an IdP or datastore containing the users requiring application access.
  • Populate HubSpot with at least one user to test access.
  • You must have administrative access to PingFederate and HubSpot.
  1. Copy the HubSpot SSO details:
    1. Sign on to HubSpot, click the Gear icon, and select Account Details from the Settings menu.
    2. In the Single Sign-on section, click Set up.
      Screen capture of HubSpot Security Settings with the Set up for Single Sign-on highlighted in red.
    3. Copy the Audience URI and Sign on URL, ACS, Recipient, or Redirect values.
      Screen capture of HubSpot Audience URI (Service Provider Entity ID) and Sign on URL, ACS, Recipient, or Redirect fields with option to copy.
  2. Create a PingFederate SP connection for HubSpot:
    1. Sign on to the PingFederate administrative console.
    2. Create an SP connection for HubSpot in PingFederate:
      1. Configure using Browser SSO profile SAML 2.0.
      2. Set Partner's Entity ID to the HubSpot Audience URI value.
      3. Enable IdP-Initiated SSO and SP Initiated SSO.
      4. In Assertion Creation: Authentication Source Mapping: Attribute Contract Fulfillment, map the SAML_SUBJECT to the email attribute.
      5. In Protocol Settings: Assertion Consumer Service URL, set Binding to POST and set Endpoint URL to the HubSpot Sign on URL, ACS, Recipient, or Redirect value.
      6. In Protocol Settings: Allowable SAML Bindings, enable POST.
      7. In Credentials: Digital Signature Settings, select the PingFederate signing certificate.
    3. Export the metadata for the newly-created HubSpot SP connection.
    4. Export the signing certificate.
    5. Open the metadata file and copy the values of the entityID and the Location entry (https://<your value>/idp/SSO.saml2).
  3. Add the PingFederate connection to HubSpot:
    1. Sign on to HubSpot, click the Gear icon, select Account Details, and access the Single Sign-on settings.
    2. Paste the entityID value that you copied previously to the Identity Provider Identifier or Issuer URL field.
    3. Paste the Location value you copied previously to the Identity Provider Single Sign-on URL field.
    4. Paste the PingFederate certificate into the X.509 Certificate field.
      Screen capture of HubSpot identity provider setup page with fields for inputting Identity Provider Identifier or Issuer URL, Identity Provider Single Sign-on URL, and X.509 Certificate.
    5. Click Verify.
    6. In the left sidebar menu, click Account Defaults.
    7. In the Single Sign-on (SSO) section, select the Require Single Sign-on to log in check box.
      Screen capture of HubSpot Security Single Sign-on (SSO) section with Require Single Sign-on to log in checked and highlighted in red.
      Note: The user setting this up is automatically excluded to ensure their access is not lost in case of setup issues.
  4. Test the PingFederate IdP-initiated SSO integration:
    1. Go to the PingFederate SSO Application Endpoint for the HubSpot SP connection.
    2. Complete PingFederate authentication.
      You're redirected to your HubSpot domain.Screen capture of HubSpot Contacts page.
  5. Test the PingFederate SP-initiated SSO integration:
    1. Go to https://app.hubspot.com/login/sso.
    2. When you are redirected to PingFederate, enter your PingFederate username and password.
      After successful authentication, you're redirected back to HubSpot.Screen capture of HubSpot Contacts page.