Page created: 8 May 2020
|
Page updated: 25 Apr 2022
| 4 min read
Content Type How-to PingFederate Product PingOne for Enterprise SAML Standards, specifications, and protocols
Set up a SAML connection using PingFederate for CyberArk Password Vault Web Access (PVWA).
-
Go to Applications > Integration > SP Connections, and click Create Connection.
The SP Connection page opens.
- On the Connection Template tab, select Do not use a template for this connection. Click Next.
- On the Connection Type tab, select the Browser SSO Profiles check box. Click Next.
- On the Connection Options tab, make sure that the Browser SSO check box is selected. Click Next.
- On the Import Metadata tab, select None. Click Next.
-
On the General Info tab:
- In the Partners Entity ID (Connection ID) field, enter PasswordVault.
- Enter a Connection Name value.
- Click Next.
-
On the Browser SSO tab, click Configure
Browser SSO.
The Browser SSO page opens.
- On the SAML Profiles tab, select the IDP-Initiated SSO and SP-Initiated SSO check boxes. Click Next.
- On the Assertion Lifetime tab, in the Minutes Before and Minutes After fields, either leave the default setting of 5 or enter a different parameter value. Click Next.
-
On the Assertion Creation tab, click
Configure Assertion Creation.
A new Assertion Creation page opens.
- On the Identity Mapping tab, select Standard as the type of name identifier to send to the service provider. Click Next.
-
On the Attribute Contract tab, in the
SAML_SUBJECT row, in the Subject Name
Format list, select an option. Click
Next.
Note:
The Extend the Contract field isn't required.
-
Add a policy contract:
- Select an existing policy contract by clicking on its name.
- Create a new policy contract adapter for authentication:
- On the Authentication Source Mapping tab,
click Map New Authentication Policy. The Authentication Policy Mapping page opens.
- On the Authentication Policy Contract tab,
click Manage Policy Contracts.The Policy Contracts page opens.
- Click Create New Contract.The Authentication Policy Contract page opens.
- On the Contract Info tab, in the Contract Namefield, enter a name. Click Next.
- On the Contract Attributes tab, click Next.
- On the Summary tab, click Save.
- Click Done to return to the Authentication Policy Mapping page.
- On the Authentication Source Mapping tab,
click Map New Authentication Policy.
-
Map the authentication policy:
- On the Authentication Policy Contract tab, in the Authentication Policy Contract list, select the desired policy contract. Click Next.
- On the Mapping Method tab, click Next.
- On the Attribute Contract Fulfillment tab, in the Source list, select an option.
- In the Value field, enter a value.
- Click Next.
- On the Issuance Criteria tab, click Next.
- On the Summary tab, click Done to return to the Assertion Creation page.
- On the Authentication Source Mapping tab, click Next.
- On the Summary tab, click Done to return to the Browser SSO page.
-
Configure the protocol settings:
- On the Assertion Creation tab, click Next.
-
On the Protocol Settings tab, click
Configure Protocol Settings.
A new Protocol Settings page opens.
-
On the Assertion Consumer Service URL tab, enter
the values as described in the following table.
Value Entry Index
0
Binding
POST
Endpoint URL
- For PVWA version 9, enter https://<your PVWA address>/passwordvault/auth/saml/.
- For PVWA version 10, enter https://<your PVWA address>/passwordvault/api/auth/saml/logon.
- To set a particular assertion consumer URL as the default, select the Default check box in the applicable row and click Add. Click Next.
- On the Allowable SAML Bindings tab, clear the Artifact and SOAP check boxes. Click Next.
-
On the Signature Policy tab, make sure that all
the check boxes are cleared. Click Next.
Note:
By default, no check boxes are selected.
- On the Encryption Policy tab,verify the None is selected. Click Next.
- On the Summary tab, click Done to return to the Browser SSO page.
- On the Protocol Settings tab, click Next.
- On the Summary tab, click Done to return to the SP Connection page.
- On the Browser SSO tab, click Next.
-
Complete the credentials configuration:
-
On the Credentials tab, click
Configure Credentials.
The Credentials page opens.
-
In the Signing Certificate list, select the
option to use for CyberArk (RSA SAH256).
Note:
This certificate is provided to CyberArk in the SAML validation process.
- Click Next.
- On the Summary tab, click Done to return to the SP Connection page.
- On the Credentials tab, click Next.
-
On the Credentials tab, click
Configure Credentials.
- On the Activation & Summary tab, from the SSO Application Endpoint field, copy the IdP-initiated URL.
- Click Save.