Connect Your PingFederate Server to Auth0

Auth0 lets you create PingFederate Server connections.

Prerequisites

Before beginning:

Steps

As long as your server is configured in the standard way, to connect your PingFederate server to Auth0 you must:

  1. Get the signing certificate from the IdP and convert it to Base64.
  2. Create an enterprise connection in Auth0.
  3. Enable the enterprise connection for your Auth0 Application.
  4. Test the connection.

If additional setup is required for your server (such as attribute mapping), then you must create a new SAML enterprise connection instead.

Get the signing certificate from the IdP

With PingFederate Server, Auth0 acts as the service provider, so you will need to retrieve an X.509 signing certificate from the IdP (in PEM or CER format); later, you will upload this to Auth0. The methods for retrieving this certificate vary, so please see the PingFederate documentation for instructions on managing your server's certificates.

Convert signing certificate to Base64

Before you upload the X.509 signing certificate to Auth0, you must convert the file to Base64. To do this, either use a simple online tool or run the following command in Bash: cat signing-cert.crt | base64.

Create an enterprise connection in Auth0

Next, if your server is configured in the standard way, you will need to create and configure a PingFederate Enterprise Connection in Auth0 and upload your X.509 signing certificate. This task can be performed using Auth0's Dashboard.

If additional setup is required for your server (such as attribute mapping), then you must create a new SAML enterprise connection instead.

  1. Navigate to Auth0 Dashboard > Authentication > Enterprise, locate Ping Federate, and select its +.

Create Connection Type

  1. Enter details for your connection, and select Create:
Field Description
Connection name Logical identifier for your connection; it must be unique for your tenant. Once set, this name can't be changed.
PingFederate Server URL URL for your PingFederate Server.
X.509 Signing Certificate PingFederate Server public key (encoded in PEM or CER) you retrieved from the IdP earlier in this process.
Sign Request When enabled, the SAML authentication request will be signed. (Be sure to download and provide the PingFederate server with your tenant's certificate.)
Sign Request Algorithm Algorithm Auth0 will use to sign the SAML assertions. Ensure this matches your PingFederate Server's configuration.
Sign Request Digest Algorithm Algorithm Auth0 will use for the sign request digest. Ensure this matches your PingFederate Server's configuration.
Sync user profile attributes at each login When enabled, Auth0 automatically syncs user profile data with each user login, thereby ensuring that changes made in the connection source are automatically updated in Auth0.

Configure Ping Federate Settings

  1. In the Login Experience view, configure how users log in with this connection.
Field Description
Identity Provider domains A comma-separated list of the domains that can be authenticated in the Identify Provider. This is only applicable when using Identifier First authentication in the Universal Login Experience.
Add button (Optional) Display a button for this connection in the login page.
Button display name (Optional) Text used to customize the login button for new Universal Login. When set the button reads: "Continue with {Button display name}".
Button logo URL (Optional) URL of image used to customize the login button for new Universal Login. When set, the Universal Login login button displays the image as a 20px by 20px square.

Optional fields are available with the New Login Experience only. Customers using the Classic experience will not see the Add button, Button display name, or Button logo URL.

Enable the enterprise connection for your Auth0 application

To use your new PingFederate enterprise connection, you must first enable the connection for your Auth0 Applications.

Test the connection

Now you're ready to test your connection.