Tip:

For all other settings, you can use the default or customize the configuration for your needs. For help, see Configuring IdP Browser SSO in the PingFederate documentation.

For more context on subject format requirements, see SAML NameID Format urn:oasis:names:tc:SAML:2.0:nameid-format:persistent in the Ping Identity Knowledge Center.

  1. On the Browser SSO tab, click Configure Browser SSO.
  2. On the Browser SSO > SAML Profiles tab, select only IDP-Initiated SSO and SP-Initiated SSO. Click Next.
  3. On the Assertion Lifetime tab, click Next.
  4. On the Assertion Creation tab, configure the assertion.
    The following steps only cover the critical settings for the Slack connection. For a complete guide, see Managing authentication source mappings in the PingFederate documentation.
    1. Click Configure Assertion Creation.
    2. On the Attribute Contract tab, set the following name format.
      Attribute Contract Subject Name Format

      SAML_SUBJECT

      urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified

    3. In the Extended the Contract section, add the following attributes, and then click Next.
      Extend the Contract Attribute name Format

      SAML_NAME_FORMAT

      urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified

      User.Email

      urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified

    4. On the Authentication Source Mapping tab, select or create your authentication source.
      For help, see Managing authentication source mappings in the PingFederate documentation.
    5. On your authentication source Mapping Method tab, select Retrieve additional attributes from a data store.
    6. On your authentication source Attribute Sources & User Lookup tab, select or create your LDAP datastore.
    7. On your authentication source Attribute Sources & User Lookup tab, select or create your LDAP datastore. On the LDAP Directory Search tab, use the following configuration.
      For more information, see Specifying directory properties and attributes in the PingFederate documentation.
      A screenshot that shows the LDAP Directory Search tab
    8. On the Browser SSO > Assertion Creation > IdP Adapter Mapping > Attribute Contract Fulfillment tab, map the attributes as follows. Click Next.
      Note:

      This allows the connection to provide Slack with the required urn:oasis:names:tc:SAML:2.0:nameid-format:persistent name format, which PingFederate does not provide as a default option.

      Attribute Contract Source Value

      SAML_NAME_FORMAT

      text

      urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

      SAML_SUBJECT

      Adapter

      username

      User.Email

      LDAP

      mail


      A screenshot that shows the Attribute Contract Fulfillment tab with the attributes mapped.
  5. On the Browser SSO > Protocol Settings > Signature Policy tab, clear the Require authn requests... and Always sign assertion check boxes. Click Next.
  6. On the Encryption Policy tab, select None. Click Next.
  7. On the Browser SSO > Protocol Settings tab, click Next.
  8. On the Summary tab, click Done.
  9. On the SP Connection > Browser SSO tab, click Next.