Single Sign-On with PingOne
PingOne is a service providing single sign-on (SSO) for web and mobile applications.
As a CodeScan administrator, you can implement Security Assertion Markup Language (SAML) 2.0 SSO when your company uses PingOne. Users can then log in to CodeScan without providing their authentication credentials since their identity was previously validated when logging in to their PingOne session. This enables orgs to restrict login IPs via SSO.
This procedure involves the following steps:
Enabling Single Sign-On in CodeScan
Adding CodeScan as an App in PingOne
Entering PingOne- Identity Provider Data in CodeScan
Adding Attribute Mappings in PingOne
Testing the Single Sign-On Configuration
Step 1: Enabling Single Sign-On in CodeScan
Before configuring SSO in PingOne, you must enable SSO in CodeScan.
In CodeScan, click on the
Profileicon on the right corner of the screen and select your organization (underMy Organizations).
Profile Go to
Administration > SAML Connections.
SAML Connections Click on
Create Connection.
Create Connection In the
Connection namefield, enter the identity provider name as you want to appear (use only Latin characters without spaces and any special characters). Example-PingOne-SAMLEnter a valid domain name of the organization in the
Corporate domainfield that can be authenticated in the Identity Provider. This property cannot be updated after SAML Connection creation. Example- In case of[email protected], the corporate domain will beautorabit.com.Keep the
Enforce SSOcheckbox unchecked for now. You can enable Enforce SSO later when your domain has been confirmed. Once enabled, only SSO authentication will be allowed for email addresses of your corporate domain.
Step 2: Adding CodeScan as an App in PingOne
Set up the PingOne application to provide necessary configuration information for CodeScan.
Log in to your PingOne Administrator account.
Select the
Environment.Go to the
Connectionstab and selectApplicationsas a sub-tab.

Click on the
icon besides Applicationsto add a new app.In the
Add Applicationsection,Enter
CodeScanfor the application name and give a short description.Choose
Application TypeasSAML Application.

Click
Configure.In the
SAML Configurationsection, select theImport From URLoption.Enter the same
Metadata URLwhich you have generated inside CodeScan.

Click on the
Importbutton. The metadata should be successfully imported, and you should see the parsed metadata values.

Click
Save.
Step 3: Entering Identity Provider Data in CodeScan
Once the application is created, you will need to enter the identity provider data from PingOne into CodeScan.
In CodeScan, on the
SAMLpage, go toActionsand click onEdit.

You will need to paste the mandatory/optional details below into CodeScan from PingOne Identity Provider.
Mandatory Settings:
Provider Entity ID
Sign In URL
X509 Signing Certificate
SAML user email attribute
SAML user name attribute
Optional Settings:
SAML user login attribute
SAML group attribute

In PingOne, go to the
Configurationtab.Copy the following values:
Issuer ID: Copy Issuer ID value and paste it intoProvider Entity Idinside Codescan.Single Signon Service: Copy Single Signon Service value and paste it intoSign In URLinside Codescan.

Click on the
Editicon in the top-right corner.

Click on
Download Signing Certificatein X509 PEM (.crt) format and copy the content of the file (certificate) into theX509 Signing Certificatefield of Codescan SAML connection.


Click
Updateon the CodeScan page.The next step is to confirm your corporate domain to get the SSO working. You can confirm domain via raising a request to Codescan Support.
Step 4: Adding Attribute Mappings in PingOne
It’s necessary to sync attributes of IDP users with properties of CodeScan users.
In PingOne, go to the
Attribute Mappingstab of your SAML Application and click on theEditicon.Add these attributes and map to corresponding PingOne properties:
saml_subject
User ID
Yes
User ID is a default required in PingOne
saml_username
Username
Yes
PingOne username will be used for newly created CodeScan users
saml_email
Email Address
Yes
PingOne email will be copied to user profile in CodeScan
saml_name
Formatted
Optional
PingOne formatted name will be copied to user profile in CodeScan
saml_groups
Group Names
Optional
PingOne user groups will be automatically created in CodeScan Organization, and user will be added to these groups

Click
Save.Enable the
CodeScanapp.

Step 5: Testing the Single Sign-On Configuration
Log out of the CodeScan Console, and then log back in using the
Log in with SAML2option.
Enter the domain name of your organization in the
Your Company emailfield. For example- autorabit.com.You should successfully redirect to the CodeScan
Organizationpage after authentication.
Last updated
Was this helpful?



