Introduction
This article offers a detailed guide on configuring PingFederate as a SAML 2.0 identity provider
By integrating with PingFederate, Perimeter 81 can authenticate users, ensuring a secure and efficient login process.
Steps
- These are the most important configuration parameters:
EntityID: urn:auth0:perimeter81:{{WORKSPACE}}-oc for US based platform or urn:auth0:eu-sase-checkpoint:{{WORKSPACE}}-oc for EU based platform
Assertion Consumer Service URL: https://auth.perimeter81.com/login/callback?connection={{WORKSPACE}}-oc for US based platform or https://auth.eu.sase.checkpoint.com/login/callback?connection={{WORKSPACE}}-oc for EU based platform
HTTP-Redirect binding for SAML Request
HTTP-POST binding for SAML Response
Perimeter81 Attribute Name | PingFederate Attribute Name |
---|---|
given_name | Given Name |
family_name | Surname |
Configuring an SP Connection from PingFederate
- Sign on to your PingFederated account and select Create New from the SP Connections section.
- Configure the SP Connection.
- Select the Browser SSO Profiles as the Connection Type.
- Select Browser SSO as the Connection Options.
- Configure the connection Parameters (Step 1)
If you are troubleshooting the connection, you can upload the Metadata for your Perimeter81 connection- instructions available under "troubleshooting" at the bottom section of this guide.
The Entity ID, Connection Name and the Base URL will be automatically populated based on the information from the metadata file.
- Configure Browser SSO.
- Select SP-Initiated SSO and SP-Initiated SLO in SAML Profiles.
- Go to the Assertion Creation section and click Configure Assertion.
Accept all defaults for the next two screens.
- Go to the IdP Adapter Mapping section. This is where users will be authenticated. Likely, you already have one configured in your PingFederate installation. Select one, or add a new one. Auth0 only requires the NameIdentifier claim. All other attributes will be passed further to the end application.
- Configure Protocol Settings. Values for Protocol Settings are imported from the metadata file. Next, you will see the Assertion Consumer Service URL and the Sign-Out URLs. Click Next to the Allowable SAML Bindings section.
- Leave POST and Redirect enabled. Make sure SAML Assertion is always signed.
- Configure Credentials. On Digital Signature Settings, select your signing certificate and make sure you check the option to include it in the
element. - Configure the certificate used to sign incoming requests.
- Review your settings and set as Active or Inactive.
- Click Save at the bottom of the screen. You should see the new SP Connection on the Main screen.
Configuring the Connection on Perimeter 81
At this point, you will configure the integration from the Perimeter 81 side.
- Log in to your Perimeter 81 Management Platform, and navigate to Settings and then Identity Providers.
- Select + Add Provider.
- Choose SAML 2.0 Identity Providers.
- Sign In URL:
- https://sso.{{Your PingFederate Domain}}.com/idp/SSO.saml2
- Add your organization domain.
- Paste the certification from PingFederate.
- Select Done.
Recommendations
- Always replace placeholders like {{WORKSPACE}} and {{Your PingFederate Domain}} with the actual values during the configuration.
- Ensure that the correct attributes are mapped in PingFederate for accurate user authentication and authorization in Perimeter 81.
- Periodically review your PingFederate configuration settings to ensure they align with any updates or changes made within the Perimeter 81 platform
Troubleshooting
If you encounter issues during or after the setup, try reviewing your settings to ensure everything matches the instructions. In particular, check the IP addresses and other details you entered during setup. If issues persist, please consult our dedicated support.
Support Contacts
If you have any difficulties or questions, don't hesitate to contact Perimeter 81's support team. We offer 24/7 chat support on our website at Perimeter81.com, or you can email us at sase-support@checkpoint.com. We're here to assist you and ensure your VPN tunnel setup is a success