Using the TruU SAML Adapter with PingFederate
Delegate authentication requests to the TruU SAML adapter using an IdP connection in PingFederate. This allows service provider applications to continue receiving SAML assertions from PingFederate, but users will be routed to TruU for authentication. The TruU SAML adapter returns a signed SAML assertion to PingFederate, which then creates a new SAML assertion for delivery to the SP. This method doesn’t require replacing IdP infrastructure or reconfiguring single sign-on enabled applications. Custom attributes sent to SP applications via PingFederate LDAP integrations will continue to work.Detailed Steps
Step 1: Refer to the SAML Adapter Setup Guide in Help to create a SAML adapter in the TruU admin console Step 2: Navigate to the Service Provider menu in PingFederate to create a new IdP connection- Connection Type: Browser SSO Profiles
- Connection Options: Browser SSO
- Most use cases will not use JIT Provisioning
- Select URL when importing metadata and copy the URL from the SAML adapter configuration file. Leave the defaults in place and click Load Metadata
- SAML Profiles: SP-initiated SSO
- Attribute Contract: SAML_SUBJECT
- Attribute Contract: Account Mapping
- Select Map New Authentication Policy to configure a contract. The contract will only contain SAML_SUBJECT. Optionally use the SSO assertion to look up additional information from LDAP to extend the data made available to all SPs. Configure additional attributes for individual SPs after the IdP connection is configured
- Outbound SSO Bindings: Redirect
- Inbound Bindings: POST, Redirect
- Signature Policy: SAML-standard
- Encryption Policy: No Encryption
Optional Configuration: Additional SAML Attributes
If you want to provide additional SAML attributes to an SP, follow these steps: Step 1: Start by updating or creating a new Authentication Policy Contract. In this example, we have added displayName to the contractPingFederate IDP Setup Guide SAML

