This section describes how to configure PingOne as a SAML (2.0) identity provider
for
Cloud App Security to use.
Before you begin configuring PingOne, make sure that:
-
You have a valid subscription with PingOne that handles the sign-in process and eventually provides the authentication credentials to the Cloud App Security management console.
-
You are logged on to the management console as a Cloud App Security global administrator.
ImportantThe steps contained in these instructions were valid as of March 2023.
|
Procedure
- Sign in to the PingOne console with an Organization Admin account.
- Select an environment.
- Choose .
- Create a SAML application for Cloud App Security.
- Click next to the screen title Applications.
- In the Add Application panel, create the
application profile by specifying the following settings:
-
Application Name: A unique identifier for the application. For example, Cloud App Security.
-
(Optional) Description: A brief description of the application.
-
(Optional) Icon: A graphic representation of the application. Use a file up to 1MB in JPG, JPEG, GIF, or PNG format.
-
- For the application type, select SAML Application, and click Configure.
- Click Manually Enter and specify the following
settings.SettingsDescriptionACS URLThe Assertion Consumer Service URL that Cloud App Security uses to receive the SAML response.Type the ACS URL {Cloud App Security_admin_site}/ssoLogin depending on your serving site. For example, if the URL of your Cloud App Security management console is "https://admin-eu.tmcas.trendmicro.com", the ACS URL is https://admin-eu.tmcas.trendmicro.com/ssoLogin.Entity IDThe globally unique name that identifies Cloud App Security.Type the Cloud App Security logon URL of your serving site. For example, if the URL of your Cloud App Security management console is "https://admin-eu.tmcas.trendmicro.com", the entity ID is https://admin-eu.tmcas.trendmicro.com.
- Click Save.The application is successfully created and the application overview is displayed.
- Configure the SAML application.
- Click the Configuration tab and click .
- Select Sign Assertion & Response under SIGNING KEY and click Save.
- On the Configuration tab, download the signing
certificate of PingOne by clicking Download Signing
Certificate and then X509 PEM
(.crt), and record the Issuer ID
and Initiate Single Sign-On URL.
Note
The certificate and settings are used when you configure single sign-on in the Cloud App Security management console. - Click the Attribute Mappings tab and click .
- For the attribute saml_subject, change
PingOne Mapping to Email
Address and click Save.This attribute specifies that the authenticated principal is in the format of an email address.
- Click the toggle on the top right to enable the application.