Digital signing is also required for WS-Trust STS service provider (SP) connections, for signing the outbound SAML security tokens.

For browser-based SSO, digital signing is not always required for profiles using the artifact or SOAP bindings unless you chose to sign the SAML assertion on Protocol Settings > Signature Policy, or the artifact resolution messages on Back-Channel Authentication > Outbound SOAP Authentication Type.

If digital signing is not required, PingFederate does not show the Digital Signature Settings tab.

  1. On the Digital Signature Settings tab, select the certificate that you will use to sign the SSO tokens and SLO messages for the SP.
  2. Select a signing certificate from the Signing Certificate list.
    If you have not yet created or imported your certificate into PingFederate, click Manage Certificates. For more information, see Manage digital signing certificates and decryption keys.

    For WS-Federation connections using JSON Web Tokens (JWTs), only EC and RSA certificates are supported. RSA certificates must have a minimum key size of 2,048 bits. The Signing Certificate list automatically filters out certificates that do not meet these requirements.

  3. Optional: Select the Include the certificate in the signature <KeyInfo> element check box if you have agreed to send your public key with the message.

    For WS-Trust STS, the <KeyInfo> element in the SAML token includes a reference to the certificate rather than the full certificate by default unless this check box is checked.


    This step is not applicable to WS-Federation connections using JWTs.

    Select the Include the raw key in the signature <KeyValue> element check box if your partner agreement requires it.

  4. Optional: Select the signing algorithm from the list.
    The default selection is RSA SHA256 or ECDSA SHA256, depending on the Key Algorithm value of the selected digital signing certificate. Make a different selection if you and your partner have agreed to use a stronger algorithm.