Skip to content

Commit c8b5a53

Browse files
kennyj42ranbel
andauthored
Update pingfederate-saml.mdx (#22477)
* Update pingfederate-saml.mdx Our account team found this issue in a customer POC. You need to ensure you're also sending a <keyinfo> certificate as part of the SAML response * Apply suggestions from code review * Update src/content/docs/cloudflare-one/identity/idp-integration/pingfederate-saml.mdx --------- Co-authored-by: ranbel <[email protected]>
1 parent 6b7c76e commit c8b5a53

File tree

1 file changed

+13
-9
lines changed

1 file changed

+13
-9
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/pingfederate-saml.mdx

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,39 +19,43 @@ These can be any value. A prompt displays to select a signing certificate to use
1919

2020
5. In the **SAML attribute configuration** dialog select **Email attribute** > **urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress**.
2121

22+
6. Go to **SP Connections** > **SP Connection** > **Credentials**.
23+
24+
7. Add the matching certificate that you upload into the Cloudflare SAML configuration for Ping. Select **Include the certificate in the signature `<KEYINFO>` element**.
25+
2226
:::note
2327
There is an additional setting for PingFederate prior to 9.0.
2428
:::
2529

26-
6. In the **Signature Policy** tab, disable the option to **Always Sign Assertion**.
30+
8. In the **Signature Policy** tab, disable the option to **Always Sign Assertion**.
2731

28-
7. Leave the option enabled for **Sign Response As Required**.
32+
9. Leave the option enabled for **Sign Response As Required**.
2933

3034
This ensures that SAML destination headers are sent during the integration.
3135

3236
In versions 9.0 above, you can leave both of these options enabled.
3337

34-
8. A prompt displays to download the SAML metadata from Ping.
38+
10. A prompt displays to download the SAML metadata from Ping.
3539

3640
This file shares several fields with Cloudflare Access so you do not have to input this data.
3741

38-
9. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
42+
11. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
3943

40-
10. Under **Login methods**, select **Add new**.
44+
12. Under **Login methods**, select **Add new**.
4145

42-
11. Select SAML.
46+
13. Select SAML.
4347

44-
12. In the **IdP Entity ID** field, enter the following URL:
48+
14. In the **IdP Entity ID** field, enter the following URL:
4549

4650
```txt
4751
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
4852
```
4953

5054
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
5155

52-
13. Fill the other fields with values from your Ping dashboard.
56+
15. Fill the other fields with values from your Ping dashboard.
5357

54-
14. Select **Save**.
58+
16. Select **Save**.
5559

5660
To test that your connection is working, go to **Authentication** > **Login methods** and select **Test** next to the login method you want to test.
5761

0 commit comments

Comments
 (0)