With the Agentless Integration Kit, PingFederate includes your custom service provider (SP) application in the sign-on flow.
The following figure shows how your custom application is integrated into the sign-on process using the Reference ID SP Adapter:
Description
- The identity provider (IdP) sends a SAML assertion to PingFederate.
- PingFederate validates the assertion and temporarily captures the user-session attributes. The Reference ID SP Adapter generates a reference value (ABC). See Development considerations.
- PingFederate redirects the browser...
- ...to the SP application with the reference value (ABC).
The reference is included in the URL query string: https://target.example.com?REF=<referenceValue>
- The SP application sends the reference value (ABC) to PingFederate and requests
the user-session attributes.
The application makes the request through an authenticated direct HTTP call to the pickup endpoint: https://pingfederate.example.com:9031/ext/ref/pickup?REF=<referenceValue>
Note: The applications must authenticate to PingFederate using one of the three methods described in Authentication methods. If the authentication fails, the HTTP request results in an HTTP response401 – Unauthorized
status code message. - PingFederate verifies the reference value (ABC) and returns the user-session attributes to the SP application in the HTTP response.
- The target application uses the attributes associated with the reference value to create a user session, which allows the user to access to the resource.