You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Update pingfederate-saml.mdx
Our account team found this issue in a customer POC. You need to ensure you're also sending a <keyinfo> certificate as part of the SAML response
* Apply suggestions from code review
* Update src/content/docs/cloudflare-one/identity/idp-integration/pingfederate-saml.mdx
---------
Co-authored-by: ranbel <[email protected]>
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/pingfederate-saml.mdx
+13-9Lines changed: 13 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,39 +19,43 @@ These can be any value. A prompt displays to select a signing certificate to use
19
19
20
20
5. In the **SAML attribute configuration** dialog select **Email attribute** > **urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress**.
21
21
22
+
6. Go to **SP Connections** > **SP Connection** > **Credentials**.
23
+
24
+
7. Add the matching certificate that you upload into the Cloudflare SAML configuration for Ping. Select **Include the certificate in the signature `<KEYINFO>` element**.
25
+
22
26
:::note
23
27
There is an additional setting for PingFederate prior to 9.0.
24
28
:::
25
29
26
-
6. In the **Signature Policy** tab, disable the option to **Always Sign Assertion**.
30
+
8. In the **Signature Policy** tab, disable the option to **Always Sign Assertion**.
27
31
28
-
7. Leave the option enabled for **Sign Response As Required**.
32
+
9. Leave the option enabled for **Sign Response As Required**.
29
33
30
34
This ensures that SAML destination headers are sent during the integration.
31
35
32
36
In versions 9.0 above, you can leave both of these options enabled.
33
37
34
-
8. A prompt displays to download the SAML metadata from Ping.
38
+
10. A prompt displays to download the SAML metadata from Ping.
35
39
36
40
This file shares several fields with Cloudflare Access so you do not have to input this data.
37
41
38
-
9. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
42
+
11. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
39
43
40
-
10. Under **Login methods**, select **Add new**.
44
+
12. Under **Login methods**, select **Add new**.
41
45
42
-
11. Select SAML.
46
+
13. Select SAML.
43
47
44
-
12. In the **IdP Entity ID** field, enter the following URL:
48
+
14. In the **IdP Entity ID** field, enter the following URL:
0 commit comments