As well as enabling SAML SSO in SkyVault, you also need to configure the PingFederate
identity provider to work with the SkyVault SAML SSO.
Note: The following steps are example instructions to help you configure PingFederate. For
detailed configuration information see the PingFederate
documentation.
- Login to your PingFederate environment as the administrator.
-
Create your service provider connection (in this instance, SkyVault is your service
provider). To create a new service provider connection, click Create
New under My IdP Configuration > SP
Connections and complete the following tasks on each of the SP
Connection tabs.
- Connection Type tab
- Use this tab to specify the type of connection you want to establish between PingFederate and SkyVault. Ensure that the Browser SSO Profiles checkbox is selected and click Next.
- Connection Options tab
- Ensure that the Browser SSO checkbox is selected and click Next.
- Import Metadata tab
- Use this tab to import metadata from SkyVault. This is the same metadata that you have downloaded in Step 6 of Configuring SAML Settings for SSO. Click Browse and select SkyVaultSamlSpMetadata.xml (SkyVault as a SP provides metadata in the SkyVaultSamlSpMetadata.xml file). You can download this file from the Single Sign-on page in SkyVault (ensure that you are logged on to SkyVault as an administrator before you try to download this file). Click Next. The Metadata summary page is displayed, click Next.
- General Info tab
- Use this tab to provide general information about the connection you are creating. Provide the Connection ID and the Connection Name for your connection. Ensure that the Base URL is pointing to your instance of Share. Optionally, you can also provide contact information. Use this tab to set the level of transaction logging you need for SkyVault. Ensure that Standard is selected as the Logging Mode. Click Next and configure your browser settings using the Browser SSO tabs .
- Connection Type tab
-
SkyVault uses Web browser and HTTP to setup message transfers between itself and
PingFederate. To configure your browser settings, click Configure
SSO and complete the following tasks on each of the Browser SSO
tabs.
-
SAML Profiles tab
- Use this tab to select the SAML profiles you require to configure your connections. SkyVault uses all the SSO and SLO profiles available. Select all the four available profiles on this tab and click Next.
- Assertion Lifetime tab
- Use this tab to configure the time for which an assertion is valid. A SAML assertion is an XML document that contains authentication, authorization, and attribute information. Each assertion has validity time period. Accept the default and click Next. You now need to configure your assertion creation.
-
SAML Profiles tab
-
Configure your assertion creation. Configuring assertions involves specifying how
PingFederate obtains user-authentication information and uses it to create assertions for
SkyVault. This includes choosing an identity mapping method, defining the attribute
contract for SkyVault and configuring adapters. To configure assertions for SkyVault,
click Configure Assertion Creation in the Assertion
Creation tab and complete the following tasks on each of the
Assertion Creation tabs.
-
Identity Mapping tab
- Use this tab to associate remote users authenticated by PingFederate with user accounts local to SkyVault. Ensure that the Standard mapping is selected and click Next.
- Attribute Contract tab
- Use this tab to define attribute contract. An attribute contract contains user attributes that will be included in the SAML assertions for this connection.
- Choose
urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified as
the subject name format for the SAML_SUBJECT attribute contract.Note: The contract includes the default SAML_SUBJECT, which identifies the user in the assertion. This is because you used the standard identity mapping.
- Extend the Contract by adding an email part to it. Type Email in the Extend the Contract text box. Choose urn:oasis:names:tc:SAML:2.0:attrname-format:basic. as the attribute name format. Click Add. Notice that the details have now been added (they appear on the screen). Click Next.
-
Identity Mapping tab
-
Configure your IdP adapter mapping. IdP adapters are used for user authentication in
the single sign-on process. When a SkyVault user puts in his credentials, his user
attributes are returned to PingFederate. To configure IdP adapter mapping for SkyVault,
click Map New Adapter Instance in the Identity
Mapping tab and complete the following tasks on each of the IdP
Adapter Mapping tabs.
-
Adapter Instance tab
- Use this tab to set up an adapter instance for this connection. An adapter instance is a configured and deployed adapter. Choose IdP Adapter from the Adapter Instance drop-down box and click Next.
-
Assertion Mapping tab
- Use this tab to set up an assertion mapping. Setting up assertion mappings involves defining data stores that you want to use to look up adapter contract values. Ensure Use only Adapter Contract values in the SAML assertion is selected. Click Next.
-
Attribute Contract Fulfilment tab
- Use this tab to map each attribute to fulfill the Attribute Contract from the sources.
- Select Adapter as the Source for the Email attribute contract.
- Select email as the Value for the Email attribute contract.
- Select Adapter as the Source for the SAML_SUBJECT attribute contract.
- Select subject as the Value for the SAML_SUBJECT attribute contract. Click Next.
- Issuance Criteria tab
- Use this tab to configure criteria to determine whether users are authorized to access SkyVault resources. This information is optional and is not required for SkyVault. Click Next. Click Done.
- Click Next. Click Done. You will be redirected to the Browser SSO tab.
-
Adapter Instance tab
-
Configure bindings, endpoints, and other settings needed for SAML profiles. Click
Protocol Settings in the Browser SSO tab
and complete the following tasks on each of the Protocol Settings
tabs.
- Assertion Consumer Service URL tab
- Use this tab to associate bindings to the Assertion Customer Service Endpoint where SkyVault will receive assertions. Select POST from the Binding drop-down list and type /share/-your SAML-enabled network-/saml/authnresponse in the Endpoint URL field. Click Add. Click Next.
- SLO Service URLs tab
- Use this tab to associate bindings to the endpoints where SkyVault receives logout requests when a Single Log-out (SLO) request is initiated by PingFederate and where PingFederate sends SLO responses. Select POST from the Binding drop-down list and type /share/-your SAML-enabled network-/saml/logoutrequest and https://-your server-/share/-your SAML-enabled network-/saml/logoutresponse in the Endpoint URL and Response URL fields, respectively. Click Add. Click Next.
- Allowable SAML Bindings tab
- Use this tab to select the bindings you want to SkyVault to send to PingFederate when sending messages. Ensure that only POST is selected as the binding type. Click Next.
- Signature Policy tab
- Use this tab to provide options for controlling digital signatures for SSO. Accept the default and click Next.
- Encryption Policy tab
- Use this tab to configure encryption of all or part of an assertion. Ensure that None is selected and click Next. Click Done.
- Click Next. Click Done.
- Assertion Consumer Service URL tab
-
Configure security settings for messaging between PingFederate and SkyVault. Click
Configure Credentials in the Credentials
tab and complete the following tasks on each of the Credentials
tabs.
-
Digital Signature Settings tab
- Use this tab to specify the certificate that you will use to sign assertions and SLO messages for SkyVault. This certificate must be the certificate you have previously uploaded into SkyVault as shown in Configuring SAML settings for SSO.
-
Signature Verification Settings tab
- Use this tab to specify the certificate used to validate SkyVault SAML messages. PingFederate provides two options for signature verification. Choose the Unanchored option. Click Browse to select SkyVault's public certificate and then click Extract.
- Click Next. The Summary screen is displayed. You can review or edit your credentials configuration here.
- When you finish editing the existing settings, click Done on the Summary screen and then Save on the Credentials screen.
-
Digital Signature Settings tab
- Ensure that you've activated your connection.
You've now successfully configured PingFederate to work with SkyVault SAML SSO. Try
testing SAML settings to make sure everythings
set up ok.