Single Sign-on: SAML IdP Setup Instructions
Note
Single Sign-on (SSO) is an add-on feature. Please contact our sales team for more information.
Single Sign-on allows you to integrate PingPlotter Cloud user authentication with your preferred identity provider.
PingPlotter Cloud Setup
Warning!
Once an IdP has been added, all users will be required to authenticate using SSO. Be sure to add groups/users to your PingPlotter Cloud application within your IdP before hitting save. Please contact support support if you accidentally lock yourself out of your account.
These steps will generally be the same for each identity provider:
- Go to Manage --> SSO --> Add Identity Provider
- Name - Use the name of your IDP (Entra ID, OneLogin, etc)
- Login URL - the login endpoint as specified by your IdP
- Logout URL - the logout endpoint as specified by your IdP
- Certificate - upload the SHA256 certificate downloaded from your IdP
Microsoft Entra ID
These instructions pertain to Microsoft Entra ID (formely known as Azure Active Directory). Please see this page for more specific details.
Add a New Microsoft Entra ID Application
Log into your Azure Subscription and navigate to https://entra.microsoft.com.
In the left-sidebar menu select Identity -> Applications -> Enterprise applications.
Click All Applications, then click the New application button.
Click Create your own application.
Give your application a name (e.g. PingPlotter Cloud), and select the
Integrate any other application you don't find in the gallery (Non-gallery)
option, then click create.Click Enterprise applications in the left-hand nav and click on the newly created app.
Click Single sign-on, and select SAML.
Find the Basic SAML Configuration section, and click the edit icon.
Click Add identifier, and paste this value:
https://pingplotter.cloud
.Click Add reply URL, and paste this value:
https://pingplotter.cloud/api/saml/AssertionConsumerService
Paste this value in Logout Url:
https://pingplotter.cloud/api/saml/SingleLogoutService
.Click save
Find the SAML Certificates section, and click the Download link for the Certificate (Raw) (you will need this later).
Find the Set up EntraID-SAML section, copy the following fields and save them for when you configure PingPlotter.
Login URL, e.g.
http://login.microsoftonline.com/{tenantId-GUID}/saml/
Microsoft Entra Identifier, e.g.
https://sts.windows.net/{tenantId-GUID}/
Logout URL, e.g.
https://login.microsoftonline.com/{tenantId-GUID}/saml2/
OneLogin
Add a Custom App
Go to Applications → Add App
Search for and add SAML Custom Connector (Advanced).
Update the Name, icon, etc and hit Save.
App Configuration
Recipient =
https://pingplotter.cloud
ACS (Consumer) URL Validator =
^https://pingplotter.cloud/$
ACS (Consumer) URL =
https://pingplotter.cloud/api/saml/AssertionConsumerService
SAML not valid on or after =
60
App Parameters
Select Parameters from the left-sidebar navigation.
Click the + button in the upper right.
Field Name =
emailaddress
Check the Include in SAML assertion box.
Hit Save.
Value =
Email
Hit Save.
Get your Certificate
Select SSO from the left-sidebar navigation.
Change SAML Signature Algorithm to SHA-256.
Hit Save in the upper right.
Hit View Details below X.509 Certificate.
Hit Download.