apps/docs/content/guides/integrate/services/pingidentity-saml.mdx
This guide shows how to enable login with ZITADEL on Ping Identity.
It covers how to:
Prerequisites:
We have to switch between ZITADEL and Ping Identity. If the headings begin with "ZITADEL" switch to the ZITADEL Management Console and if the headings start with "Ping" please switch to the PingIdentity GUI.
To add an external identity provider, you can follow the instructions here
We recommend activating signing the auth request whenever possible:
Everything you need to know about the attribute mapping you can find in Ping Identity's documentation
To add the connection to ZITADEL you have to build the metadata, which should minimalistic look like this, the necessary information can be found on the External IDPs page under "P1Connection" and "IDP Configuration" :
ENTITYID="PINGONE (SP) ENTITY ID"
ACSURL="ACS ENDPOINT"
<?xml version="1.0"?>
<md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="${ENTITYID}">
<md:SPSSODescriptor
protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol urn:oasis:names:tc:SAML:1.1:protocol">
<md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="${ACSURL}"
index="0"/>
</md:SPSSODescriptor>
</md:EntityDescriptor>
In your existing project:
Everything on the side of ZITADEL is done if the application is correctly created.