Sunday, 5 May 2013

Federation establishment with PingFederate IdP and OpenAM SP


  • Create a Hosted SP in OpenAM and check "Use Name ID as User ID"  in Account Mapper
  • Configure Identity Provider role in PingFederate
  • Export the metadata from OpenAM using ssoadm.jsp and create SP connection in PingFederate
  • Export metadata from PingFederate and create a remote identity provider in OpenAM

  • Verify the SP and IDP in Circle of Trust and Initiate IdP initiated SSO from PingFederate and verify the SAML assertion in OpenAM Federation.log file
     Note: The Name ID sent from IDP (PingFederate) should match the local account user ID