The following sections describe PingFederate service provider (SP) endpoints, including the query parameters that each accepts or requires. These endpoints accept either the HTTP GET or POST methods.
Begin each URL with the fully-qualified server name and port number of your PingFederate SP server; for example, https://www.example.com:9031/sp/startSSO.ping.
When using the parameters TargetResource or TARGET with their own query parameters included, the parameter value must be URL-encoded. Any other parameters that contain restricted characters, such as many SAML URNs, also must be URL-encoded. For information about URL encoding, see third party resources such as HTML URL-encoding Reference. Parameters are case-sensitive.
/sp/startSSO.ping
This is the path used to initiate SP-initiated single sign-on (SSO). In this scenario, the SP issues an SSO request to the identity provider (IdP) asking for an SSO authentication response. Typically, a systems integrator or developer creates links to this endpoint in SP applications to allow users to access various protected resources through SSO using the IdP as an authentication authority.
For information about allowing applications to retrieve configuration data from the PingFederate server over SOAP, see Web service interfaces and APIs.
The following table shows the HTTP parameters for this endpoint.
Some parameters described below can have multiple values. Specify these values by using multiple independent query string parameters of the same name.
Parameter | Description |
---|---|
PartnerIdpId | The federation ID of the IdP that authenticates the user and issues an
assertion. This ID is case-sensitive. Required if more than one IdP connection is configured and Domain is not used, and SP authentication policies are turned off. Not required if SP authentication policies are turned on. |
SpSessionAuthnAdapterId | The explicit SP adapter instance ID indicating the adapter to use to
create an authenticated session or security context. Optional if SP authentication policies are turned off. Required if SP authentication policies are turned on unless the PingFederate SP server can determine the applicable SP adapter instance based on the target URL mapping configuration and the TargetResource or TARGET value at runtime. |
TargetResource or TARGET | This parameter indicates the target applications where a successful SSO
redirects the end-user. The parameter value must be URL-encoded. When this parameter is not provided in the URL, you can specify a default target resource in the administrative console, either for all IdP connections, for individual connections, or both. For more information, see Configuring default URLs and Configuring default target URLs. |
InErrorResource (optional) |
This parameter indicates where an unsuccessful SSO redirects the end-user. If this parameter is not included in the request, PingFederate redirects the user to the single log-out (SLO) error landing page hosted within PingFederate. For more information, see Customizable user-facing pages. |
Binding (optional) |
Indicates the binding to use; allowed values are URIs defined in the
SAML specifications. For example, the SAML 2.0 applicable URIs
are
When the parameter is not used for SAML 2.0, the first SSO Service URL configured for the IdP-partner connection is used. For more information, see Specifying SSO service URLs (SAML). |
AllowCreate (optional - SAML 2.0) |
Controls the value of the AllowCreate attribute of
the NameIDPolicy element in the AuthnRequest. The
default is true . |
AuthenticatingIdpId (optional - SAML 2.0) |
This parameter indicates the preferred IdP for authenticating the user
through an IdP proxy, such as PingOne for Enterprise. The parameter
specifies the value of the ProviderID attribute in the
Scoping/IDPList/IDPEntry element in the
AuthnRequest. For more information, see section 3.4.1.3.1 of the OASIS SAML
document saml-core-2.0-os.pdf. You can specify multiple values to build a preferred list. |
ForceAuthn (optional - SAML 2.0 or OpenID Connect) |
For SAML 2.0, this parameter controls the attribute of the same name in
the AuthnRequest. For OpenID Connect, a value of The default is
|
IsPassive (optional - SAML 2.0 or OpenID Connect) |
For SAML 2.0, this parameter controls the attribute of the same name in
the AuthnRequest. For OpenID Connect, a value of The default is
|
RequestedACSIdx (optional - SAML 2.0) |
The index number of your site's Assertion Consumer Service, where you want the assertion to be sent. |
RequestedAcsUrl (optional - SAML 2.0) |
The URL of your site's Assertion Consumer Service, where you want the assertion to be sent. |
RequestedAuthnCtx (optional - SAML 2.0 or OpenID Connect) |
For SAML 2.0, this parameter indicates the requested authentication
context of the assertion; allowed values include URIs defined in the SAML
specifications. For more information, see the OASIS SAML document saml-authn-context-2.0-os.pdf. For OpenID Connect, the specified value becomes the acr_values parameter value in the authentication request. You can specify multiple values to build a preferred list. |
RequestedAuthnDeclRef (optional - SAML 2.0) |
An alternative to RequestedAuthnCtx above,
indicating the requested authentication context of the assertion by
declaring any URI reference. For more information see section 2.7.2.2 of the
OASIS SAML document saml-core-2.0-os.pdf.
You can specify multiple values to build a preferred list. |
RequestedBinding (optional - SAML 2.0) |
Indicates the binding requested for the response containing the assertion; allowed values are URIs defined in the SAML specifications. |
RequestedFormat (optional - SAML 2.0) |
Specifies the value for the Format attribute in the NameIDPolicy element of the AuthnRequest. If not specified, the AuthnRequest does not include the attribute. |
RequestedSPNameQualifier (optional - SAML 2.0) |
Indicates that the IdP should return the given name qualifier as part of the assertion used primarily to identify SP affiliations. For more information, see SP affiliations. |
vsid (optional) |
Specify the virtual server ID. When absent, PingFederate uses the default virtual server ID (if specified) for the connection or the SAML federation ID defined in Server Settings. For more information, see Identifying the partner and Specifying federation information. |
PolicyAction (optional) |
The HTML Form Adapter immediately returns the value of this parameter in
the policy.action attribute, allowing the policy to
bypass the adapter in favor of an alternative authentication source,
provided a rule matching the action is configured. When this parameter is
set to identity.registration and the adapter is followed by
a local identity profile, the user is directed to the registration page for
the profile. |
If SpSessionAuthnAdapterId specifies an adapter, then that adapter is used to create an authenticated session for SP-initiated SSO. If there is no SpSessionAuthnAdapterId, the ultimate destination of the user after SSO, either the TargetResource or the default SSO success URL, is used along with the mappings defined in the administrative console on the Map URLs to Adapter Instances window. For more information, see Configuring target URL mapping.
Note that adapter selection for SP-initiated SSO is similar to that for IdP-initiated SSO except that, because the adapter ID depends on the SAML deployment, PingFederate cannot expect it from an IdP. Therefore, it uses only the URL mapping for adapter selection for SSO.
/sp/startSLO.ping
This is the path used to initiate SP-initiated SLO. Typically, a systems integrator or developer creates one or more links to this endpoint in the protected resources of their SP application, which allows users to end a session by sending a logout request to the IdP that authenticated the session.
Note that the IdP might send additional logout request messages to other SPs when it receives a logout request from a PingFederate server acting as an SP.
Parameter | Description |
---|---|
TargetResource (optional) |
Indicates where a successful SLO redirects the user. If the request
does not include this parameter, PingFederate uses the URL for a
successful SLO as a default, as entered on the SP Default
URLs window. Note that the parameter value must be URL-encoded. |
Binding (optional - SAML 2.0) |
Indicates the binding to use; allowed values are URIs defined in the
SAML specifications. The SAML 2.0 applicable URIs
are
When the parameter is not used, the first SLO Service URL configured for the IdP-partner connection is used. For more information, see Specifying SLO service URLs (SAML 2.0). |
InErrorResource (optional) |
Indicates where an unsuccessful SLO redirects the user. If the request does not include this parameter, PingFederate redirects the user to the SLO error landing page hosted within PingFederate. For more information, see Customizable user-facing pages. |
/sp/defederate.ping
This path terminates an account link created during SSO. Account linking provides a means for subject identification on the SP side. On the SP side, only users create and terminate links. The link contains the name identifier from the IdP, the IdP's federation ID, the adapter instance ID, and the local user identifier.
There are no HTTP parameters for this endpoint.
You can unlink a user session only if it was established during SSO using an existing account link on the SP side. If more than one SP session was established through account linking on the same PingFederate session, this endpoint will terminate each of those links. A local logout is also performed for any link that is terminated.
/sp/cdcstartSSO.ping
This endpoint is used for IdP-Discovery implementations. For more information, see Standard IdP Discovery . This endpoint is similar to /sp/startSSO.ping and accepts the same parameters, with the exception of PartnerIdpId and vsid. Instead of this parameter, the server attempts to use the common domain cookie to determine the IdP.
/sp/startAttributeQuery.ping
This endpoint initiates an Attribute Query with a SAML 2.0 IdP. For more information, see Attribute Query and XASP .
Some parameters described below can have multiple values. Specify these values by using multiple independent query string parameters of the same name.
Parameter | Description |
---|---|
Subject | Uniquely identifies the user to the IdP. When user authenticates with an X.509 certificate, this is the Subject DN, which must be URL-encoded. |
Issuer (optional) |
The IssuerDN from the user's X.509 certificate, when X.509 attribute
sharing profile (XASP) is used, which uniquely identifies the entity that
issued the user's certificate. The parameter must be URL-encoded. Note:
When specified this parameter overrides the Subject parameter. |
PartnerIdpId (except for XASP) |
Used to identify the specific IdP partner to which the attribute query
should be sent. Without this parameter, the Subject and Issuer are used to
determine the correct IdP. Note:
For XASP, this parameter overrides both the Subject and Issuer parameters. |
Format (required for XASP, otherwise optional) |
Identifies the name-identifier format of the
Subject query parameter. If included, the value must
be one of the SAML 2.0 Name Identifier Format URIs. For more information,
see section 8.3 of the SAML
specifications. Note:
For XASP, this parameter must be set to
If not specified, the parameter defaults to
The parameter must be URL-encoded. |
AppId | The unique identifier of the initiating application. |
SharedSecret | Used to authenticate the initiating application. Both the
AppId and SharedSecret values
must match those defined on the window. Important:
To avoid recording this parameter in web server logs, only pass it in the message body using the HTTP POST method. |
RequestedAttrName (optional) |
A name of a user attribute requested from the IdP. For each desired user
attribute, include this parameter. If this parameter is not present, then
the IdP returns all allowable user attributes. You can specify multiple values to build a preferred list. |
vsid (optional) |
Specify the virtual server ID. When absent, PingFederate uses the default virtual server ID, if specified, for the connection or the SAML federation ID defined in Server Settings. For more information, see Identifying the partner and Specifying federation information. |