Page created: 3 Dec 2020
|
Page updated: 19 Oct 2021
| 2 min read
Product PingOne for Enterprise Administration User task Product documentation Content Type Administrator Audience IDaaS Deployment Method Single Sign-on (SSO) Capability Managed service provider
-
Import the metadata for Zoom:
- To upload the metadata file: Click Select File.
- To enter the URL of the metadata: Click Or use URL.
- Required: In the ACS URL and Entity ID fields, replace the ${vanity} variables with your Zoom vanity URL.
- In the Target Resource field, enter a URL to redirect the user to after identity provider (IdP)-initiated SSO.
- In the Single Logout Endpoint field, enter a URL for PingOne for Enterprise to send single logout (SLO) requests to.
-
In the Single Logout Response Endpoint field, enter a
URL for PingOne for Enterprise to send SLO responses
to.
Tip:
Using the https://<your vanity URL>.zoom.us/saml/singlelogout SLO endpoint for both Single Logout Endpoint and Single Logout Response Endpoint improves your security by ending the user session in the application when the user's SSO session ends.
- To add a Primary Verification Certificate, click Browse to locate and upload a local certificate file used to verify SLO requests and responses coming from Zoom.
- To add a Secondary Verification Certificate, click Browse to locate and upload a local certificate used to verify SLO requests and responses if the primary certificate fails.
- To require your identity bridge to re-authenticate users with an active SSO session, select the Force Re-authentication check box .
-
If you want PingOne for Enterprise to pass the
RequestedAuthnContext
request to the IdP for your account, select Pass-Thru RequestedAuthnContext to IdP.Note:This option is available only if you upload a primary verification certificate.
- To encrypt outgoing SAML assertions, select the Encrypt Assertion check box.
-
On the Signing line:
- To have PingOne for Enterprise sign outgoing SAML assertions: Click Sign Assertion. This is the default option.
- To have PingOne for Enterprise sign responses to incoming SAML assertions: Click Sign Response.
- In the Signing Algorithm list, select an algorithm with which to sign SAML assertions.
- To enter a customer URL to launch Zoom from the dock, select the Use Custom URL check box.
Click Continue to Next Step.