PingFederate
This integration uses the SAML 2.0 protocol. With the SAML integration, you can connect your PingFederate solution with Akamai MFA, providing the user with two-step authentication. First, the user needs to confirm their identity with your PingFederate instance, for example, using their username and password. Next, the user has to confirm that the login is legitimate using one of the Akamai MFA second factors.
Before you begin
Create a SAML Integration in Enterprise Center
How to
- In the PingFederate admin console, go to Authentication > Integration > IdP Connections.
- Click Create Connection.
- In the Connection Type tab, select Browser SSO Profiles.
- In the Protocol dropdown menu, select SAML 2.0 and click Next.
- In the Connection Options tab, select the Browser SSO checkbox and click Next.
- In the Import Metadata tab, select None and click Next.
- In the General Info tab, do the following:
a. In Partner’s Entity ID (Connection ID), enter the Issuer URI you generated in Enterprise Center.
b. In Connection Name, enter a name of your choice. - Click Next.
- In the Browser SSO tab, click Configure Browser SSO.
- In the SAML Profiles tab, select both IDP-INITIATED SSO and SP-INITIATED SSO as your Single Sign-On (SSO) Profiles. Don’t select any Single Logout (SLO) Profiles.
- Click Next.
- In the User-Session Creation tab, click Configure User-Session Creation.
- In the Identity Mapping tab, select ACCOUNT MAPPING and click Next.
- In the Attribute Contract tab, click Next.
- In the Target Session Mapping tab, click Map New Authentication Policy.
- In the Authentication Policy Contract tab, expand the AUTHENTICATION POLICY CONTRACT dropdown menu and select your policy contract.
- Click Next.
- In the Attribute Retrieval tab, select USE ONLY THE ATTRIBUTES AVAILABLE IN THE SSO ASSERTION and click Next.
- In the Contract Fulfillment tab, do the following:
a. Expand the Source dropdown menu forsubject
and select Assertion.
b. Expand the Value dropdown menu forsubject
and select SAML_SUBJECT.
c. Click Next. - In the Issuance Criteria tab, you can configure optional criteria to be evaluated during the SSO transaction. Once you’ve set them up, click Next.
- In the Summary tab, check that the information you’ve entered is correct. Your Summary tab may look something like this:
Authentication Policy Contract | |
Selected contract | <your contract name> |
Attribute Retrieval | |
Attribute location | Use only the attributes available in the SSO Assertion |
Contract Fulfillment | |
subject | SAML_SUBJECT(Assertion) |
Issuance Criteria | |
Criterion | <your criterion> or (None) |
-
Click Done.
The Target Session Mapping tab opens.
-
In the Target Session Mapping tab, you should now see your added Authentication Policy Contract Name. Click Next.
-
In the Summary tab, check that the information you’ve entered is correct. Your Summary tab may look something like this:
Identity Mapping | |
Enable Account Mapping | true |
Attribute Contract | |
Attribute | SAML_SUBJECT |
Target Session Mapping | |
Authentication policy contract name | <your contract name> |
Authentication Policy Contract | |
Selected contract | <your contract name> |
Attribute Retrieval | |
Attribute location | Use only the attributes available in the SSO Assertion |
Contract Fulfillment | |
subject | SAML_SUBJECT(Assertion) |
Issuance Criteria | |
Criterion | <your criterion> or (None) |
-
Click Done.
The User-Session Creation tab opens.
-
In the User-Session Creation tab, click Next.
-
In the Protocol Settings tab, click Configure Protocol Settings.
-
In the SSO Service URLs tab, do the following:
a. Expand the Binding dropdown menu and select POST.
b. In Endpoint URL, enter the SSO URL you generated in Enterprise Center.
c. In Action, click Add.
d. Click Next. -
In the Allowable SAML Bindings tab, deselect the ARTIFACT, REDIRECT and SOAP bindings. The POST binding should be the only one that remains selected.
-
Click Next.
-
In the Overrides tab, click Next.
-
In the Signature Policy tab, do the following:
a. Select the SPECIFY ADDITIONAL SIGNATURE REQUIREMENTS checkbox.
b. Select the SIGN AUTHN REQUESTS SENT OVER POST AND REDIRECT BINDINGS checkbox.
c. Click Next. -
In the Encryption Policy tab, select NONE and click Next.
-
In the Summary tab, check that the information you’ve entered is correct. Your Summary tab may look something like this:
SSO Service URLs | |
Endpoint | <your SSO URL> |
Allowable SAML Bindings | |
Artifact | false |
POST | true |
Redirect | false |
SOAP | false |
Overrides | |
Signature Policy | |
Sign AuthN requests over POST and Redirect | true |
Require digitally signed SAML Assertion | false |
Encryption Policy | |
Status | Inactive |
-
Click Done.
The Protocol Settings tab opens.
-
In the Protocol Settings tab, click Next.
-
In the Summary tab, check that the information you’ve entered is correct. Your Summary tab may look something like this:
Browser SSO | |
SAML Profiles | |
IdP-initiated SSO | true |
IdP-initiated SLO | false |
SP-initiated SSO | true |
SP-initiated SLO | false |
User-Session Creation | |
Identity Mapping | |
Enable Account Mapping | true |
Attribute Contract | |
Attribute | SAML_SUBJECT |
Target Session Mapping | |
Authentication policy contract name | <your contract name> |
Authentication Policy Contract | |
Selected contract | <your contract name> |
Attribute Retrieval | |
Attribute location | Use only the attributes available in the SSO Assertion |
Contract Fulfillment | |
subject | SAML_SUBJECT(Assertion) |
Issuance Criteria | |
Criterion | <your criterion> or (None) |
Protocol Settings | |
SSO Service URLs | |
Endpoint | URL: <your SSO URL> (POST) |
Allowable SAML Bindings | |
Artifact | false |
POST | true |
Redirect | false |
SOAP | false |
Overrides | |
Signature Policy | |
Sign AuthN requests over POST and Redirect | true |
Require digitally signed SAML Assertion | false |
Encryption Policy | |
Status | Inactive |
-
Click Done.
The Browser SSO tab opens.
-
In the Browser SSO tab, click Next.
-
In the Credentials tab, click Configure Credentials.
-
In the Digital Signature Settings tab, do the following:
a. Expand the SIGNING CERTIFICATE dropdown menu and select your certificate.
b. Select the INCLUDE THE CERTIFICATE IN THE SIGNATURE ELEMENT checkbox.
c. Select the INCLUDE THE RAW KEY IN THE SIGNATURE ELEMENT checkbox.
d. Expand the SIGNING ALGORITHM dropdown menu and select RSA SHA256.
e. Click Next. -
In the Signature Verification Settings tab, click Manage Signature Verification Settings.
-
In the Trust Model tab, select UNANCHORED and click Next.
-
In the Signature Verification Certificate tab, click Manage Certificates.
-
On the Certificate Management screen, click Import.
-
In the Import Certificate tab, click Choose File.
OS File Manager opens.
-
Choose your certificate file that you generated and downloaded in the first step of the SAML Integration in Enterprise Center.
-
Click Next.
-
Back in the Import Certificate tab, you can now see the details of your certificate.
-
Click Save and Done.
-
Your certificate is now listed in the Signature Verification Certificate tab.
-
Click Next.
-
In the Summary tab, check that the information you’ve entered is correct. Your Summary tab may look something like this:
Trust Model | |
Trust Model | Unanchored |
Signature Verification Certificate | |
Active Certificate 1 | <your certificate> |
- Click Done.
- In the Signature Verification Settings tab, click Next.
- In the Summary tab, check that the information you’ve entered is correct. Your Summary tab may look something like this:
Credentials | |
Digital Signature Settings | |
Selected Certificate | <your credentials certificate> |
Include Certificate in KeyInfo | true |
Include Raw Key in KeyValue | true |
Select Signing Algorithm | RSA SHA256 |
Signature Verification | |
Trust Model | |
Trust Model | Unanchored |
Signature Verification Certificate | |
Active Certificate 1 | <your certificate> |
- Click Done.
- In the Credentials tab, click Next.
- In the Activation & Summary tab, you can once more go over your settings before activating the connection. If everything is correct, click Save.
- The IdP Connections screen opens. Your new connection is now present on the list.
- In the Action tab of the IdP Connection, click Select Action to expand the dropdown menu.
- Download the metadata by clicking the Export Metadata link.
- Upload the exported metadata to the SAML integration you created in Enterprise Center. To upload, in your integration settings, click Provision > Metadata.
- Select your metadata file and click Upload.
- Save and deploy your integration.
You've just configured a SAML integration between your PingFederate solution and Akamai MFA.
Updated about 1 year ago