Using Fortanix Data Security Manager with Ping Identity

Overview

This article describes how to integrate Ping One with Fortanix Data Security Manager (DSM) using SAML configuration.

Prerequisites

  • Fortanix DSM
  • Ping Identity installed and pre-configured on the user’s system

Configuration on Ping Identity

  1. Log in to the Ping Identity admin page. ( https://admin.pingone.com/web-portal/login). Picture1.png
                                                          Figure 1: Ping Identity Admin Page
     
  2. To create a new SAML application:
    1. Go to the APPLICATIONS tab.
    2. Click subtab My Applications.
    3. Click the subtab SAML for configuring
    4. Now click the Add Application dropdown, and then select New SAML Application Picture9.png
                                                     Figure 2: Create New SAML Application
       
  3. In the Application details, enter the Application Name, Application Description, Category and update the Graphics icon as per your organization. Picture10.png
                                                       Figure 3: Enter Application Details
     
  4. Click Continue to Next Step to go to the Application Configuration and update the following information as shown in the figure below:

     Update the following information in the Ping Identity application:

    1. Assertion Consumer Service (ACS): https://sdkms.fortanix.com/saml
    2. Entity ID: https://sdkms.fortanix.com/saml/metadata.xml
    3. Application URL: https://sdkms.fortanix.com/
    Picture2.png
                                                   Figure 4: Configure Ping Identity Application
     
  5. Click Continue to Next Step for configuring SSO Attribute Mapping.
  6. If you do not have any SSO Attribute Mapping, then click Continue to Next Step to configure Group Access.
    Picture14.png
                                                          Figure 5: SSO Attribute Mapping
     
  7. Add the Group access for Domain Administrators and Users in the Directory. Picture15.png
                                                        Figure 6: Adding Group Access
      Picture16.png
                                                          Figure 7: Adding Group Access
     
  8. Review the setup and download the SAML Metadata, and then click Finish.
    Picture17.png
                                                            Figure 8: Download SAML Metadata
     
  9. Once done you will be able to find the application in the Ping Identity menu. Picture19.png
                                                        Figure 9: Application Added Successfully
     

Configuration on Fortanix Data Security Manager

  1. Log in to the Fortanix DSM portal (https://sdkms.fortanix.com/).
  2. In the Fortanix DSM left panel click the Settings tab, and then in the Authentication tab, select Single Sign On. Picture5.png
                                                            Figure 11: Select Single Sign On
     
  3. Add the SAML integration, and upload the SAML file downloaded from the Ping identity. Picture20.png
                                                           Figure 12: Add SAML Integration
     
  4. Customize the SSO, by adding a name and URL for the logo image. Picture21.png
                                                                  Figure 13: Customize SSO
     
  5. Once you have the Ping Identity SSO integrated successfully you will be able to see it as shown in the following screenshot. Picture8.png
                                         Figure 14: Ping Identity Integrated in Fortanix DSM
     
  6. Now, log out from Fortanix DSM and sign in using SSO. Picture6.png
                                                     Figure 15: Sign in using SSO

        Note.png NOTE: Please ensure that the users who will log into Fortanix DSM are part of the Users list in ping Identity. A user can log in using Ping Identity SSO in Fortanix DSM only if the user's name is mentioned in the Ping Identity user domain.
    Picture22.png
                                                   Figure 16: Users added to Ping Identity
     
Was this article helpful?
0 out of 0 found this helpful