Skip to content

Commit c3d5986

Browse files
authored
Update pingfederate-saml.mdx
Our account team found this issue in a customer POC. You need to ensure you're also sending a <keyinfo> certificate as part of the SAML response
1 parent 3d1d65c commit c3d5986

File tree

1 file changed

+13
-9
lines changed

1 file changed

+13
-9
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/pingfederate-saml.mdx

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,39 +19,43 @@ These can be any value. A prompt displays to select a signing certificate to use
1919

2020
5. In the **SAML attribute configuration** dialog select **Email attribute** > **urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress**.
2121

22+
6. Go to SP Connections > SP Connection > Credentials
23+
24+
Add the matching certificate that you upload into the Cloudflare SAML configuration for Ping. Select "include the certificate in the signature <KEYINFO> element".
25+
2226
:::note
2327
There is an additional setting for PingFederate prior to 9.0.
2428
:::
2529

26-
6. In the **Signature Policy** tab, disable the option to **Always Sign Assertion**.
30+
8. In the **Signature Policy** tab, disable the option to **Always Sign Assertion**.
2731

28-
7. Leave the option enabled for **Sign Response As Required**.
32+
9. Leave the option enabled for **Sign Response As Required**.
2933

3034
This ensures that SAML destination headers are sent during the integration.
3135

3236
In versions 9.0 above, you can leave both of these options enabled.
3337

34-
8. A prompt displays to download the SAML metadata from Ping.
38+
10. A prompt displays to download the SAML metadata from Ping.
3539

3640
This file shares several fields with Cloudflare Access so you do not have to input this data.
3741

38-
9. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
42+
11. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
3943

40-
10. Under **Login methods**, select **Add new**.
44+
12. Under **Login methods**, select **Add new**.
4145

42-
11. Select SAML.
46+
13. Select SAML.
4347

44-
12. In the **IdP Entity ID** field, enter the following URL:
48+
14. In the **IdP Entity ID** field, enter the following URL:
4549

4650
```txt
4751
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
4852
```
4953

5054
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
5155

52-
13. Fill the other fields with values from your Ping dashboard.
56+
15. Fill the other fields with values from your Ping dashboard.
5357

54-
14. Select **Save**.
58+
16. Select **Save**.
5559

5660
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test.
5761

0 commit comments

Comments
 (0)