Ping Identity Configuration Manual
Ping Identity Configuration Manual
Prerequisites
l CoLOS Product Suite V6.3.3 or later.
4. To activate your account, check your email Inbox and Junk/ Spam, Click Verify Email in
the email sent to you.
5. On the registration page, complete all required fields. Check the terms and conditions
and Click Start Trial.
In the Your role field, select your role from the drop down list. If your
role is not listed, select Other. A new field labeled Specify Role will
appear where you can type your role.
The new Password should differ from recently used passwords and
must contain at least 8 characters, including 1 uppercase letter, 1 lower
case letter, 1 special character, and 1 number.
2/61
To access your PingOne account, simply click the link in your regis-
tration email to reach the sign-in page. To sign in to your PingOne
account:
3/61
l To authenticate using email, sign in to your account that requires authentication.
l In the authentication window, enter the passcode and Click Sign On.
4/61
9. The PingOne home page opens. Click menu icon ( ), and select
Manage Environment to view the available administrator environments.
Groups
Creating a Group
1. Go to Directory Groups.
2. Click .
3. Enter the required information for the group.
4. Click Save.
Users
You can use the users page to manage users in your environment.
Adding a New User
1. Go to Directory Users.
2. Click .
3. Enter the required information for the user.
5/61
In the Population field, Select the Administrators Population from the
drop down list.
4. Click Save.
5. Click the user entry to open the user details panel. Navigate to Roles tab, Click Grant
Roles to grant specific access to Pingone Capabilities.
6/61
7. For all other CoLOS applications, Click Client Application Developer in Avaliable
responsibilities, Select the Environment and Click Save. Enter your business email
address.
7/61
Adding User to the Group
1. Go to Directory Groups.
2. Click the appropriate group name to expand the details pane and to add users.
3. Click Users tab.
4. Click Add Individually button.
If the group already has members, Click the Pencil icon ( ) to edit
mwership using Edit Users or Edit Users Filter
8/61
Configuring the CoLOS Applications:
l Configuiring the CoLOS Administartor
l Configuring the CoLOS Designer
l Configuring the CoLOS Production
l Configuring the CoLOS OEE
l Configuring the CoLOS Data Management
l Configuring the CoLOS Design Control
l Configuring the CoLOS Operator Panel
4. Enter the application name, Select SAML Application and Click Configure.
9/61
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs: https://Servername:9340/UserAuthApi/SamlLoginResponse
Entity ID: https://auth.pingone.com/ba5d18f6-09e8-4025-95e9-
127738339896/as
10/61
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.
3. Update the TARGET APPLICATION URL with CoLOSAdministrator, and Click Save.
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
11/61
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.
5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application.
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.
12/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.
13/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
14/61
Select Medium Security if the High Security option is not available to
you.
6. On the Apps section, expand the section for the application and enter the following:
15/61
It is same for all CoLOS applications. You must configure
CoLOS Administrator before configuring any other
CoLOS applications.
8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.
Restart the CoLOS application, then log in using your PingID credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
16/61
Configuring the CoLOS Designer
Creating CoLOS Designer application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.
4. Enter the application name, Select SAML Application and Click Configure.
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/designer
17/61
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.
3. Update the TARGET APPLICATION URL with CoLOSDesigner, and Click Save.
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
18/61
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.
5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.
19/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.
3. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
20/61
4. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
5. On the Apps section, expand the section for the application and enter the following:
21/61
6. On the General section, fill out the following mandatory fields:
l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator
7. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.
22/61
8. Click Test, enter your credentials, Click Sign on.
Restart the CoLOS application, then log in using your PingID credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
23/61
Keep the Population field at its default setting.
4. Enter the application name, Select SAML Application and Click Configure.
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/pui
24/61
2. Navigate to the Configuration tab, Click the pencil icon ( ).
3. Update the TARGET APPLICATION URL with PUI, and Click Save.
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
25/61
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.
5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.
26/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.
27/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
28/61
Select Medium Security if the High Security option is not available to
you.
6. On the Apps section, expand the section for the application and enter the following:
29/61
8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.
Restart the CoLOS application, then log in using your PingID credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
30/61
Configuring the CoLOS Overall Equipment Effectiveness
Creating CoLOS Overall Equipment Effectiveness application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.
4. Enter the application name, Select SAML Application and Click Configure.
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/OEE
31/61
Result: New application is created.
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.
3. Update the TARGET APPLICATION URL with OEE, and Click Save.
32/61
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.
5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.
33/61
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.
34/61
3. To import the certificate
l Go to System Properties Certificate Management. Select Import next to
CoLOS Overall Equipment Effectiveness SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
35/61
5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
6. On the Apps section, expand the section for the application and enter the following:
36/61
7. On the General section, fill out the following mandatory fields:
l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator
8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.
37/61
9. Click Test, enter your credentials, Click Sign on.
Restart the CoLOS application, then log in using your PingID credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
38/61
Keep the Population field at its default setting.
4. Enter the application name, Select SAML Application and Click Configure.
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/CoLOSDataManagement
39/61
Result: New application is created.
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.
40/61
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.
5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.
41/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.
42/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
43/61
Select Medium Security if the High Security option is not available to
you.
6. On the Apps section, expand the section for the application and enter the following:
44/61
l Group Attribute: Groups
8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.
Restart the CoLOS application, then log in using your PingID credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
45/61
Keep the Population field at its default setting.
4. Enter the application name, Select SAML Application and Click Configure.
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/DesignControl
46/61
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.
3. Update the TARGET APPLICATION URL with DesignControl, and Click Save.
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
47/61
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.
5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.
48/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.
49/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
50/61
Select Medium Security if the High Security option is not available to
you.
6. On the Apps section, expand the section for the application and enter the following:
51/61
8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.
Restart the CoLOS application, then log in using your PingID credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
52/61
4. Enter the application name, Select SAML Application and Click Configure.
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Server-
name:8084/api/Authentication/SamlLoginResponse
Entity ID:https://auth.pingone.asia/cat
53/61
2. Navigate to the Configuration tab, Click the pencil icon ( ).
3. Update the TARGET APPLICATION URL with cat, and Click Save.
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
54/61
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.
5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.
55/61
7. Open SQL and add the following details in scUser table.
o scName - username
o scRole - groupname
o scStation - Profiles created in Toolkit
8. Open Toolkit, navigate to Configuration Security and then change the Security
Mode: to User Log On . Click the check box to enable User Defines Station, and Use
authentication modes configured in CoLOS Enterproise other than LDAP .
9. To add a role , Click and enter the Role Name same as Ping ID groupname. Click
Save and deploy the project.
56/61
Using SAML
1. Open CoLOS Administrator and go to CAT Properties Configuration. Check
Enable Https , Click Apply and then Ok.
57/61
4. To Import CoLOS Toolkit certificate
l Go to System Properties Certificate Management. Select Import next to
CAT.
l Select the Select from installed certificates. Select the file and Click OK.
5. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right
click and Select Restart.
58/61
6. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
7. On the Apps section, expand the section for the application and enter the following:
59/61
8. On the General section, fill out the following mandatory fields:
l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator
9. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.
60/61
10. Click Test, enter your credentials, Click Sign on.
Restart the CoLOS application, then log in using your PingID credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
This manual provides the necessary steps to configure PingOne for secure identity man-
agement within your organization, including user and group management, application cre-
ation, and integration with CoLOS applications.
61/61