PingOne SAML Setup
Create a new SAML configuration in Kasm
Log into the Kasm UI as an administrator.
Select Authentication -> SAML -> Create New Configuration
The SAML 2.0 Configuration page will auto-generate the Entity ID, Single Sign On Service, Single Logout Server, and Relay State values.
Check Enable and enter a Display Name. e.g (PingOne)
Enter
memberOf
in Group Member AttributeEnter
emailAddress
in NameID AttributeLeave this page open and continue to the next steps.
Create a new SAML Application in PingOne
In the PingOne Admin portal, click Applications -> My Applications -> Add Application -> New SAML Application
Give the application a Name, Description , Category and optionally an icon. Click Continue to Next Step
Copy the Service Provider entries from the Kasm SAML Configurations started in the previous section into the Basic SAML configurations and click.
Kasm Property Name
PingOne Property Name
Entity ID
Entity ID
Single Sign On Service
Assertion Consumer Service (ACS)
Single Logout Service
<Server URL> (e.g https://kasm.server)
Relay State
Application URL
Select Redirect for Single Logout Binding Type
Select RSA_SHA1 for Signing Algorithm
Select Continue to Next Step
At the SSO Attribute Mapping page click Continue to Next Step
At the Group Access page enabled the groups desired. In this example we will add both the built in Domain Administrators@directory and Users@directory groups.
Select Continue to Next Step. The Review Setup page is shown.
Click Download next to Signing Certificate. Open this file with a text editor. This will be used as the Singing Certificate in the next section.
Click Download next to SAML Metadata. Open the file with a text editor.
Identify the Location for the
md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
property. This will be used as the Single Logout Service property in the next section.Identify the Location for the
md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
property. This will be used as the Single Sign On Service property in the next section.
Complete SAML configuration in Kasm
Back in the Kasm UI SAML configuration page update the Identity Provider selections
Kasm Property Name
Azure Property Name
Entity ID
Issuer
Single Sign On Service
Single Sign On Service
Single Logout Service / SLO Endpoint
Single Logout Service
X509 Certificate
Signing Certificate
In the Advanced Settings of check Want Assertion Signed and click Submit
In the Advanced Settings of check Want Assertion Signed and click Submit
Mapping Users
PingOne is not set up to pass along the user’s group membership during the SAML assertion. These groups can be mapped to groups within the Kasm Application. In the previous step we gave application login permissions to both the Domain Administrators@directory and Users@directory groups in PingOne. The following steps will now map the PingOne Domain Administrators@directory group to the Administrators group in Kasm.
In the PingOne Admin portal, click Users -> User Groups
Inspect the Domain Administrators@directory group.
Log into the Kasm UI as an administrator.
Select Groups, then using the three dot menu click View next to the Administrators Group
Scroll to the bottom of the screen and select Add SSO Mapping.
Select the SAML IDP that was created above “SAML - PingOne” for the SSO Provider.
Enter Domain Administrators@directory into the Group Attributes field.
Testing Access
Log out of the Kasm UI if already logged in.
Navigate to the Kasm UI login page.
Click PingOne to initiate the SAML SSO process.
Login as a member of the Domain Administrators@directory group.