[go: up one dir, main page]

0% found this document useful (0 votes)
7 views61 pages

Ping Identity Configuration Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views61 pages

Ping Identity Configuration Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

9/10/2024

Ping Identity Configuration Manual


Introduction
PingOne is a cloud-based service that helps keep your company's identity and access secure.
This document provides information on integrating Pingone with CoLOS.

Prerequisites
l CoLOS Product Suite V6.3.3 or later.

Getting Started with Pingone


Accessing the Ping Identity
1. Open a web browser.
2. Go to Ping Identity.
oAlternatively, in the address bar, type the following URL:
https://www.pingidentity.com/en/try-ping.html and press Enter.
3. Enter your business email address and Click Try Ping.

4. To activate your account, check your email Inbox and Junk/ Spam, Click Verify Email in
the email sent to you.

5. On the registration page, complete all required fields. Check the terms and conditions
and Click Start Trial.
In the Your role field, select your role from the drop down list. If your
role is not listed, select Other. A new field labeled Specify Role will
appear where you can type your role.

The new Password should differ from recently used passwords and
must contain at least 8 characters, including 1 uppercase letter, 1 lower
case letter, 1 special character, and 1 number.

6. Enter the Password and Click Sign On.

2/61
To access your PingOne account, simply click the link in your regis-
tration email to reach the sign-in page. To sign in to your PingOne
account:

Locate the registration email you received.

Click on the link provided in that email.

You will be redirected to the sign-in page. Enter your credentials


to access your account.

7. Select Continue to begin Multi-Factor Authentication (MFA) enrollment.

8. Choose your preferred MFA method from the options provided.

3/61
l To authenticate using email, sign in to your account that requires authentication.

l In the authentication window, enter the passcode and Click Sign On.

If you need to generate a passcode, Click Resend Passcode.

l To authenticate using Authenticator App, download the Microsoft Authenticator


app to your mobile then scan the QR code or input the Passcode which you
received. Click Sign On.

4/61
9. The PingOne home page opens. Click menu icon ( ), and select
Manage Environment to view the available administrator environments.

Groups
Creating a Group
1. Go to Directory Groups.
2. Click .
3. Enter the required information for the group.

Keep the Population field at its default setting.

4. Click Save.

Users
You can use the users page to manage users in your environment.
Adding a New User
1. Go to Directory Users.
2. Click .
3. Enter the required information for the user.

5/61
In the Population field, Select the Administrators Population from the
drop down list.

4. Click Save.

Result: The user is created in the directory.

5. Click the user entry to open the user details panel. Navigate to Roles tab, Click Grant
Roles to grant specific access to Pingone Capabilities.

6. For CoLOS administrator, Click Application Owner in Avaliable responsibilities,


Select the Environment and Click Save. Enter your business email address.

6/61
7. For all other CoLOS applications, Click Client Application Developer in Avaliable
responsibilities, Select the Environment and Click Save. Enter your business email
address.

Manage Users in Group Membership


Add user to your group.

7/61
Adding User to the Group
1. Go to Directory Groups.
2. Click the appropriate group name to expand the details pane and to add users.
3. Click Users tab.
4. Click Add Individually button.

5. Click the All Users tab.


All available users are shown in the All Users list.
6. Select the required users by selecting checkbox right next to the users.
7. Click Save.

If the group already has members, Click the Pencil icon ( ) to edit
mwership using Edit Users or Edit Users Filter

8/61
Configuring the CoLOS Applications:
l Configuiring the CoLOS Administartor
l Configuring the CoLOS Designer
l Configuring the CoLOS Production
l Configuring the CoLOS OEE
l Configuring the CoLOS Data Management
l Configuring the CoLOS Design Control
l Configuring the CoLOS Operator Panel

Configuring the CoLOS Administrator


You can add applications to your environment so that Pingone can manage access to the
applications.
Creating CoLOS Administrator application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.

Keep the Population field at its default setting.

4. Enter the application name, Select SAML Application and Click Configure.

9/61
5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs: https://Servername:9340/UserAuthApi/SamlLoginResponse
Entity ID: https://auth.pingone.com/ba5d18f6-09e8-4025-95e9-
127738339896/as

Replace <Servername> with your actual server name.

6. Click Save to create the application.

Result: New application is created.

10/61
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.

2. Navigate to the Configuration tab, Click the pencil icon ( ).

3. Update the TARGET APPLICATION URL with CoLOSAdministrator, and Click Save.

4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.

11/61
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.

5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application.

6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.

12/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.

2. Go to Web Production Panel Properties Configuration. Check Enable Https,


Click Apply and then OK.

3. To import the certificate


l Go to System Properties Certificate Management. Select Import next
to CoLOS Administrator SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.

13/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.

5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.

14/61
Select Medium Security if the High Security option is not available to
you.

6. On the Apps section, expand the section for the application and enter the following:

l Destination URL: Single Signon Service in Pingone

Destination URL is same for all applications.

l Issuer: Entity ID in Pingone.

Refer to the following figure

7. On the General section, fill out the following mandatory fields:


l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator

15/61
It is same for all CoLOS applications. You must configure
CoLOS Administrator before configuring any other
CoLOS applications.

l Group Attribute: Groups

8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.

9. Click Test, enter your credentials, Click Sign on.

Authentication needs to be successful in Test Information.

Restart the CoLOS application, then log in using your PingID credentials.

Click CoLOS User Login to login with your CoLOS login credentials.

16/61
Configuring the CoLOS Designer
Creating CoLOS Designer application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.

Keep the Population field at its default setting.

4. Enter the application name, Select SAML Application and Click Configure.

5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/designer

Replace <Servername> with your actual server name. In Entity


ID URL replace aisa with your corresponding region.

6. Click Save to create the application.

Result: New application is created.

17/61
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.

2. Navigate to the Configuration tab, Click the pencil icon ( ).

3. Update the TARGET APPLICATION URL with CoLOSDesigner, and Click Save.

4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.

18/61
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.

5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.

6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.

19/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.

2. To import the certificate


l Go to System Properties Certificate Management. Select Import next to
CoLOS Designer SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.

3. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.

20/61
4. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.

Select Medium Security if the High Security option is not available to


you.

5. On the Apps section, expand the section for the application and enter the following:

l Destination URL: Single Signon Service in Pingone

Destination URL is same for all applications.

l Issuer: Entity ID in Pingone.

Refer to the following figure

21/61
6. On the General section, fill out the following mandatory fields:
l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator

It is same for all CoLOS applications. You must configure


CoLOS Administrator before configuring any other
CoLOS applications.

l Group Attribute: Groups

7. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.

22/61
8. Click Test, enter your credentials, Click Sign on.

Authentication needs to be successful in Test Information.

Restart the CoLOS application, then log in using your PingID credentials.

Click CoLOS User Login to login with your CoLOS login credentials.

Configuring the CoLOS Production (PUI)


Creating CoLOS Production application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.

23/61
Keep the Population field at its default setting.

4. Enter the application name, Select SAML Application and Click Configure.

5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/pui

Replace <Servername> with your actual server name. In Entity


ID URL, replace aisa with your corresponding region.

6. Click Save to create the application.

Result: New application is created.

Configuring Pingone with SAML


1. Turn on the toggle next to the application. Select the application to expand the details
pane.

24/61
2. Navigate to the Configuration tab, Click the pencil icon ( ).

3. Update the TARGET APPLICATION URL with PUI, and Click Save.

4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.

25/61
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.

5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.

6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.

26/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.

2. Go to Web Production Panel Properties Configuration. Check Enable Https,


Click Apply and then OK.

3. To import the certificate


l Go to System Properties Certificate Management. Select Import next to
CoLOS Production SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.

27/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.

5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.

28/61
Select Medium Security if the High Security option is not available to
you.

6. On the Apps section, expand the section for the application and enter the following:

l Destination URL: Single Signon Service in Pingone

Destination URL is same for all applications.

l Issuer: Entity ID in Pingone.

Refer to the following figure

7. On the General section, fill out the following mandatory fields:


l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator

It is same for all CoLOS applications. You must configure


CoLOS Administrator before configuring any other
CoLOS applications.

l Group Attribute: Groups

29/61
8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.

9. Click Test, enter your credentials, Click Sign on.

Authentication needs to be successful in Test Information.

Restart the CoLOS application, then log in using your PingID credentials.

Click CoLOS User Login to login with your CoLOS login credentials.

30/61
Configuring the CoLOS Overall Equipment Effectiveness
Creating CoLOS Overall Equipment Effectiveness application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.

Keep the Population field at its default setting.

4. Enter the application name, Select SAML Application and Click Configure.

5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/OEE

Replace <Servername> with your actual server name. In Entity


ID URL, replace aisa with your corresponding region.

6. Click Save to create the application.

31/61
Result: New application is created.
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.

2. Navigate to the Configuration tab, Click the pencil icon ( ).

3. Update the TARGET APPLICATION URL with OEE, and Click Save.

32/61
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.

5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.

33/61
6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.

Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.

2. Go to Web Production Panel Properties Configuration. Check Enable Https,


Click Apply and then OK.

34/61
3. To import the certificate
l Go to System Properties Certificate Management. Select Import next to
CoLOS Overall Equipment Effectiveness SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.

4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.

35/61
5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.

Select Medium Security if the High Security option is not available to


you.

6. On the Apps section, expand the section for the application and enter the following:

l Destination URL: Single Signon Service in Pingone

Destination URL is same for all applications.

l Issuer: Entity ID in Pingone.

Refer to the following figure

36/61
7. On the General section, fill out the following mandatory fields:
l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator

It is same for all CoLOS applications. You must configure


CoLOS Administrator before configuring any other
CoLOS applications.

l Group Attribute: Groups

8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.

37/61
9. Click Test, enter your credentials, Click Sign on.

Authentication needs to be successful in Test Information.

Restart the CoLOS application, then log in using your PingID credentials.

Click CoLOS User Login to login with your CoLOS login credentials.

Configuring the CoLOS Data Management


Creating CoLOS Data Management application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.

38/61
Keep the Population field at its default setting.

4. Enter the application name, Select SAML Application and Click Configure.

5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/CoLOSDataManagement

Replace <Servername> with your actual server name. In Entity


ID URL, replace aisa with your corresponding region.

6. Click Save to create the application.

39/61
Result: New application is created.
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.

2. Navigate to the Configuration tab, Click the pencil icon ( ).

3. Update the TARGET APPLICATION URL with CoLOSDataManagement, and Click


Save.

40/61
4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.

5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.

6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.

41/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.

2. Go to Web Production Panel Properties Configuration. Check Enable Https,


Click Apply and then OK.

3. To import the certificate


l Go to System Properties Certificate Management. Select Import next to
CoLOS Data Management SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.

42/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.

5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.

43/61
Select Medium Security if the High Security option is not available to
you.

6. On the Apps section, expand the section for the application and enter the following:

l Destination URL: Single Signon Service in Pingone

Destination URL is same for all applications.

l Issuer: Entity ID in Pingone.

Refer to the following figure.

7. On the General section, fill out the following mandatory fields:


l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator

It is same for all CoLOS applications. You must configure


CoLOS Administrator before configuring any other
CoLOS applications.

44/61
l Group Attribute: Groups

8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.

9. Click Test, enter your credentials, Click Sign on.

Authentication needs to be successful in Test Information.

Restart the CoLOS application, then log in using your PingID credentials.

Click CoLOS User Login to login with your CoLOS login credentials.

Configuring the CoLOS Design Control


Creating CoLOS Design Control application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.

45/61
Keep the Population field at its default setting.

4. Enter the application name, Select SAML Application and Click Configure.

5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Servename:9340/UserAuthApi/SamlLoginResponse
Entity ID:https://auth.pingone.asia/DesignControl

Replace <Servername> with your actual server name. In Entity


ID URL, replace aisa with your corresponding region.

6. Click Save to create the application.

Result: New application is created.

46/61
Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.

2. Navigate to the Configuration tab, Click the pencil icon ( ).

3. Update the TARGET APPLICATION URL with DesignControl, and Click Save.

4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.

47/61
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.

5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.

6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.

48/61
Using SAML
1. Go to Integration Services Web API Properties Configuration. Check
Enable Https, Click Apply and then OK.

2. Go to Web Production Panel Properties Configuration. Check Enable Https,


Click Apply and then OK.

3. To import the certificate


l Go to System Properties Certificate Management. Select Import next to
CoLOS Design Control SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.

49/61
4. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.

5. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.

50/61
Select Medium Security if the High Security option is not available to
you.

6. On the Apps section, expand the section for the application and enter the following:

l Destination URL: Single Signon Service in Pingone

Destination URL is same for all applications.

l Issuer: Entity ID in Pingone.

Refer to the following figure.

7. On the General section, fill out the following mandatory fields:


l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator

It is same for all CoLOS applications. You must configure


CoLOS Administrator before configuring any other
CoLOS applications.

l Group Attribute: Groups

51/61
8. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.

9. Click Test, enter your credentials, Click Sign on.

Authentication needs to be successful in Test Information.

Restart the CoLOS application, then log in using your PingID credentials.

Click CoLOS User Login to login with your CoLOS login credentials.

Configuring the CoLOS Operator Panel (CAT)


Creating CoLOS Operator Panel application in Pingone
1. Go to Applications Applications.
2. Click .
3. Enter the required information for the Application.

Keep the Population field at its default setting.

52/61
4. Enter the application name, Select SAML Application and Click Configure.

5. Choose Manually Enter and input the ACS URLs and Entity ID.
ACS URLs:https://Server-
name:8084/api/Authentication/SamlLoginResponse
Entity ID:https://auth.pingone.asia/cat

Replace <Servername> with your actual server name. In Entity


ID URL, replace aisa with your corresponding region.

6. Click Save to create the application.

Result: New application is created.


Configuring Pingone with SAML
1. Turn on the toggle next to the application. Select the application to expand the details
pane.

53/61
2. Navigate to the Configuration tab, Click the pencil icon ( ).

3. Update the TARGET APPLICATION URL with cat, and Click Save.

4. Navigate to Attribute Mapping tab, Click the pencil icon ( ) . Click +Add.

54/61
o Select Username instead of UserID in Pingone Mappings.
o Select Group IDs in Pingone Mappings after typing memberofgroupnames in
Attributes. Check the box. Click +Add.
o Select Group Names in Pingone Mappings after typing Groups in Attributes.
Check the box.
o Click Save.

5. Navigate to Access tab, Click the pencil icon ( ). Grant access to the Groups who
need it for that specific application. Click Save.

6. In Configuration tab, Click Download Signing Certificate, and choose X509 PEM
(.crt) from the dropdown. Click Keep to download the file.

55/61
7. Open SQL and add the following details in scUser table.
o scName - username
o scRole - groupname
o scStation - Profiles created in Toolkit

Refer to the following figure.

8. Open Toolkit, navigate to Configuration Security and then change the Security
Mode: to User Log On . Click the check box to enable User Defines Station, and Use
authentication modes configured in CoLOS Enterproise other than LDAP .

9. To add a role , Click and enter the Role Name same as Ping ID groupname. Click
Save and deploy the project.

56/61
Using SAML
1. Open CoLOS Administrator and go to CAT Properties Configuration. Check
Enable Https , Click Apply and then Ok.

2. Go to Integration Services Web API Properties Configuration. Check


Enable Https, Click Apply and then OK.

3. To import the Ping ID certificate


l Go to System Properties Certificate Management. Select Import next to
CoLOS Operator Panel SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.

57/61
4. To Import CoLOS Toolkit certificate
l Go to System Properties Certificate Management. Select Import next to
CAT.
l Select the Select from installed certificates. Select the file and Click OK.

5. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right
click and Select Restart.

58/61
6. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.

Select Medium Security if the High Security option is not available to


you.

7. On the Apps section, expand the section for the application and enter the following:

l Destination URL: Single Signon Service in Pingone

Destination URL is same for all applications.

l Issuer: Entity ID in Pingone.

Refer to the following figure

59/61
8. On the General section, fill out the following mandatory fields:
l Audience URL: https://auth.pingone.com.au/e44ad58a-071e-44a2-
8e90-ca9af-
d474511/saml20/idp/startsso?spEntityId=CoLOSAdministrator

It is same for all CoLOS applications. You must configure


CoLOS Administrator before configuring any other
CoLOS applications.

l Group Attribute: Groups

9. To use the additional HTTP header, on the Misc section, select True from the drop-
down menu only if you are using Pingid credentials to login.

60/61
10. Click Test, enter your credentials, Click Sign on.

Authentication needs to be successful in Test Information.

Restart the CoLOS application, then log in using your PingID credentials.

Click CoLOS User Login to login with your CoLOS login credentials.

This manual provides the necessary steps to configure PingOne for secure identity man-
agement within your organization, including user and group management, application cre-
ation, and integration with CoLOS applications.

61/61

You might also like