1. Import the metadata for Zendesk:
    • Click Select File to upload the metadata file.
    • Click Or use URL to enter the URL of the metadata.
  2. In the ACS URL and Entity ID fields, replace the ${accountname} variables with the your Zendesk account name.
  3. In the Target Resource field, enter a URL to redirect the user to after IdP-initiated single sign-on (SSO).
  4. In the Single Logout Endpoint field, enter a URL for PingOne for Enterprise to send single logout (SLO) requests to.
  5. In the Single Logout Response Endpoint field, enter a URL for PingOne for Enterprise to send SLO responses to.
  6. To add a Primary Verification Certificate, click Browse to locate and upload a local certificate file used to verify SLO requests and responses coming from Zendesk.
  7. To add a Secondary Verification Certificate, click Browse to locate and upload a local certificate used to verify SLO requests and responses if the primary certificate fails.
  8. Select the Force Re-authentication check box to require your identity bridge to re-authenticate users with an active SSO session.
  9. Select Pass-Thru RequestedAuthnContext to IdP if you want PingOne for Enterprise to pass the RequestedAuthnContext request to the IdP for your account.

    This option is available only if you upload a primary verification certificate.

  10. Select the Encrypt Assertion check box to encrypt outgoing SAML assertions.
  11. On the Signing line:
    • Click Sign Assertion to have PingOne for Enterprise sign outgoing SAML assertions. This is the default option.
    • Click Sign Response to have PingOne for Enterprise sign responses to incoming SAML assertions.
  12. In the Signing Algorithm list, select an algorithm with which to sign SAML assertions.
  13. Select the Use Custom URL check box to enter a customer URL to launch Zendesk from the dock.
Click Continue to Next Step.