Connect Your PingFederate Server to Auth0
Auth0 lets you create PingFederate Server connections.
Prerequisites
Before beginning:
Register your Application with Auth0.
Select an appropriate Application Type.
Add an Allowed Callback URL of
{https://yourApp/callback}
.Make sure your Application's Grant Types include the appropriate flows.
Steps
As long as your server is configured in the standard way, to connect your PingFederate server to Auth0 you must:
Get the signing certificate from the IdP and convert it to Base64.
Enable the enterprise connection for your Auth0 Application.
Get the signing certificate from the IdP
With PingFederate Server, Auth0 acts as the service provider, so you will need to retrieve an X.509 signing certificate from the IdP (in PEM or CER format); later, you will upload this to Auth0. The methods for retrieving this certificate vary, so please see the PingFederate documentation for instructions on managing your server's certificates.
Convert signing certificate to Base64
Before you upload the X.509 signing certificate to Auth0, you must convert the file to Base64. To do this, either use a simple online tool or run the following command in Bash: cat signing-cert.crt | base64
.
Create an enterprise connection in Auth0
Next, if your server is configured in the standard way, you will need to create and configure a PingFederate Enterprise Connection in Auth0 and upload your X.509 signing certificate. This task can be performed using Auth0's Dashboard.
Navigate to Auth0 Dashboard > Authentication > Enterprise, locate Ping Federate, and select its
+
.Enter details for your connection, and select Create:
Field Description Connection name Logical identifier for your connection; it must be unique for your tenant. Once set, this name can't be changed. PingFederate Server URL URL for your PingFederate Server. X.509 Signing Certificate PingFederate Server public key (encoded in PEM or CER) you retrieved from the IdP earlier in this process. Sign Request When enabled, the SAML authentication request will be signed. (Be sure to download and provide the PingFederate server with your tenant's certificate.) Sign Request Algorithm Algorithm Auth0 will use to sign the SAML assertions. Ensure this matches your PingFederate Server's configuration. Sign Request Digest Algorithm Algorithm Auth0 will use for the sign request digest. Ensure this matches your PingFederate Server's configuration. Sync user profile attributes at each login When enabled, Auth0 automatically syncs user profile data with each user login, thereby ensuring that changes made in the connection source are automatically updated in Auth0. In the Login Experience view, configure how users log in with this connection.
Field Description Identity Provider domains A comma-separated list of the domains that can be authenticated in the Identify Provider. This is only applicable when using Identifier First authentication in the Universal Login Experience. Add button (Optional) Display a button for this connection in the login page. Button display name (Optional) Text used to customize the login button for new Universal Login. When set the button reads: "Continue with {Button display name}". Button logo URL (Optional) URL of image used to customize the login button for new Universal Login. When set, the Universal Login login button displays the image as a 20px by 20px square.
Enable the enterprise connection for your Auth0 application
To use your new PingFederate enterprise connection, you must first enable the connection for your Auth0 Applications.
Test the connection
Now you're ready to test your connection.