Bomgar Connection Configuration - PingOne for Enterprise
PingOne for Enterprise
- bundle
- pingoneforenterprise
- ft:publication_title
- PingOne for Enterprise
- Product_Version_ce
- PingOne for Enterprise
- category
- Product
- pingone
- ContentType_ce
-
In PingOne for Enterprise, import the metadata for
Bomgar:
- Click Select File to upload the metadata
file.
- Click Or use URL to enter the URL of the
metadata.
-
In the ACS URL field, enter the value from the
Assertion Consumer Service URL field in the Bomgar
admin interface.
-
In the Entity ID field, enter the value from the
Entity ID field in the Bomgar admin interface.
-
In the Target Resource field, enter a URL to redirect
the user to after IdP-initiated single sign-on (SSO).
-
In the Single Logout Endpoint field, enter a URL for
PingOne to send single logout (SLO) requests to.
-
In the Single Logout Response Endpoint field, enter a
URL for PingOne to send SLO responses to.
-
On the Primary Verification Certificate line, click
Browse to locate and upload a local certificate file
used to verify SLO requests and responses.
-
On the Secondary Verification Certificate line, click
Browse to locate and upload a local certificate used
to verify SLO requests and responses if the primary certificate fails.
-
Select the Force Re-authentication check box to require
your identity bridge to re-authenticate users with an activeSSO session.
-
Select the Encrypt Assertion check box to encrypt
outgoing SAML assertions.
-
On the Signing line:
- Click Sign Assertion to have PingOne sign
outgoing SAML assertions. This is the default option.
- Click Sign Response to have PingOne sign
responses to incoming SAML assertions.
-
From the Signing Algorithm list, select an algorithm
with which to sign SAML assertions.
-
Select the Use Custom URL check box to enter a customer
URL to launch Bomgar from the dock.
Click Continue to Next
Step.