Configuration
v5.17.1
Search this version
Configuration
Configuration
Settings Section
Title
Message
Create new category
What is the title of your new category?
Edit page index title
What is the title of the page index?
Edit category
What is the new title of your category?
Edit link
What is the new title and URL of your link?
Configure SAML SSO
Copy Markdown
Open in ChatGPT
Open in Claude
Create SAML directory on MDCore
- Login to MDCore
- At dashboard, hit
User Managementin sidebar - Under
User Managementpage, chooseDirectoriestab and hitAdd directoryon the top right

- In
Add Directorypage, chooseSAMLinDirectory Type, fillNamefor the new directory, MDCore-SAML for example - Under
Service Providersection, enable optionUse custom entity IDand fill out the ID, MDCORE-PINGONE-SAML for example, then store it in entity_id - Fill
Host or IPwhere MDCore is hosting, https://127.0.0.1:8008 for this example - Copy string generated under
Login URLand store to reply_uri

Create and configure SAML application in PingOne
- In the PingOne Overview page, navigate
Applicationson sidebar

- Hit on plus button to add new application

- Fill application name, MDCore-SAML for an example, choose
SAML Applicationfor Application Type and hitConfigure

- Select
Manually Enterfor SAML Configuration, fillACS URLswith reply_uri, andEntity IDwith entity_id, and hitSave

- Select
Overviewtab, navigate toIDP Metadata URL, copy the link below and store to metadata_url
__

- Select
Attribute Mappingstab and click Edit button.

- In
Edit Attribute Mappingspage, hitAddto add new mapping
In this step, we make a mapping from the key name used by MDCore and the name exported by PingOne. For example, we set given_name mapped to Given Name exported by PingOne. Later on, given_name is used by MDCore to identify the login user
- Fill attribute name,
given_namein this example, select itemGiven Namein PingOne Mappings, enableRequiredoption and hitSaveto complete

- Enable the new application on PingOne

Complete configuration on MDCore
- Switch back to MDCore, under
Identity Provider, hitFetch URL, paste metadata_url to the box under, and then hitOK, which requests MDCore to check and set PingOne as its IDP if succeed

- Under
Service Provider, fill ${given_name} in the box underUser identified by

- Select
Default roleoption, choose the role to assign to login user underUser Roleand hitAddto complete setting on MDCore

- In
User Managementpage, toggle the new directory, MDCORE-SAML in this example. A dialog box is shown to confirm the action. OnceEnableis hit, all sessions are expired immediately

Test the integration
- In home screen on MDCore, hit
Login, the user is redirected to login page from PingIdentity

- Login by the account registered to PingIdentity
- If everything goes right, MDCore dashboard is shown with user identity set at the top right corner

- Otherwise, access back login page at
<mdcore-host>#/public/backuploginfor trouble shooting.
Test IdP-initiated login
- Login to PingOne management page.
- On the left sidebar, hit
Applications, thenApplications. - Select the SSO directory from which IdP-initiated login is enabled. MDCore-SAML in this example.

- On the right sidebar, hit tab
Overview. Copy the URL underInitiate Single Sign-On URL.

- Paste the URL into your browser and try to sign in.

- If everything goes right, MDCore dashboard is shown with user identity set at the top right corner

- Otherwise, access back login page at
<mdcore-host>#/public/backuploginfor troubleshooting.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Last updated on
Was this page helpful?
Next to read:
Configure OIDC SSODiscard Changes
Do you want to discard your current changes and overwrite with the template?
Archive Synced Block
Message
Create new Template
What is this template's title?
Delete Template
Message
