Skip to main content
All CollectionsKnowledge BaseDruva Cloud PlatformHow To - Druva Cloud Platform
How to configure SSO for DCP Administrators using PingFederate as IdP
How to configure SSO for DCP Administrators using PingFederate as IdP
Updated over 2 months ago

This article applies to:

  • Product edition: Druva Cloud Platform (DCP)

Overview

This article describes the steps to configure SSO for Druva Cloud Platform using PingFederate as IdP. The configuration involves the following main tasks:


❗ Important

  • Only a Druva Cloud administrator can set up Single Sign-on.

  • Configure Single Sign-on based on the applicable scenarios:

    • New Druva customers that is; Phoenix customers on-boarded after 02 July 2018 and inSync customers on-boarded after 14 July 2018 must refer to the instructions given in this article.

    • Existing Phoenix and inSync customers who already have configured Single Sign-on, must continue to use the existing Single Sign-on settings of Phoenix and the Single Sign-on settings of inSync as applicable.


Generate SSO Token from DCP Console

  1. Log in to the DCP Console and on its menu bar click the account icon > Settings.

  2. Click Generate SSO Token.

  3. Click Copy. The token gets copied to the clipboard.

  4. Copy the token in a text file and keep the file available for future use.

Configure the PingOne app

Prerequisites:

  • Administrator credentials of PingOne

  • SSO authentication token generated from the DCP Console.

Procedure:

  1. Log in to PingOne console with the administrator credentials ( https://admin.pingone.com )

  2. From the dashboard, open the Applications page and click Add Application > New SAML Application.

  3. Enter the Application Name, Application Description, and Category as appropriate.

  4. Click Next and enter the values as specified below:
    Assertion Consumer Service (ACS): https://login.druva.com/api/commonlogin/samlconsume
    Entity ID: DCP-login

  5. Leave default values in the remaining fields and click Continue to next step.

  6. Click Add new attribute and enter the values as shown in the illustration below:

    • SAML_SUBJECT:SAML_SUBJECT

    • druva_auth_token:Enter the SSO authentication token value and also select As Literal. If you do not wish to use As Literal, enclose the authentication token in double quotation ("") marks, such as "X-XXXXX-XXXX-S-A-M-P-L-E+TXOXKXEXNX="

    • emailAddress:SAML_SUBJECT

    • userPrincipalName:SAML_SUBJECT

    DCP_SSOAttribMapping.png
  7. Click Save and Publish.

  8. On the Review Setup page:

  9. Copy IdP ID value from Initiate Single Sign-On (SSO) URL as shown in the in the image below.

    DCP_InitiateSSOURL.png
  10. Download the Signing Certificate.
    Keep the above details available for future use.

Configure DCP to use PingOne

  1. Log in to the DCP Console and on its menu bar click the account icon > Settings.

  2. Click Edit against Single Sign-On and update each field as directed in the table below:

    • ID Provider Certificate:Open the Signing Certificate that was downloaded in the earlier procedure in a notepad and copy its content to this field. Take care to keep certificate formatting intact in the text editor.

    • Single Sign-On for Administrators:Select.

    • Failsafe for Administrators:

      Select.


      💡 Tip

      Druva recommends enabling this fields initially. Failsafe for Administrators enables the administrator to use both SSO and DCP password to access the DCP Console. This ensures access to the DCP Console even if SSO is impacted due to any change in the IdP.


    DCP_ConfigureToUsePingOne.png
  3. Click Save.
    On all subsequent attempts to log in to DCP Console, provide the administrator's email ID and DCP directs to the IdP page to authenticate using SSO.


NOTE:

When configuring Druva with PingOne for single sign-on (SSO) using SAML (Security Assertion Markup Language), the User Principal Name (UPN) and email address attributes are critical because they uniquely identify users across systems. Setting these attributes as SAML_SUBJECT in PingOne ensures that the correct user identity is passed from PingOne to Druva during the authentication process. Here’s why this is necessary:

  1. Unique User Identification:
    The SAML_SUBJECT is a key element in the SAML assertion, representing the unique identity of the user being authenticated.
    In most organizations, the UPN or email address is used as the primary identifier for users. By mapping these attributes to SAML_SUBJECT, you ensure that the unique identity of the user is consistently passed to Druva for authentication.

  2. Consistency Across Systems:
    Druva requires a unique identifier to match the incoming SAML assertion with an existing user account.
    The UPN or email address is typically unique and standardized across the organization, making it the ideal candidate for the SAML_SUBJECT.
    This consistency ensures that the right user is authenticated and granted access without conflicts or mismatches.

  3. SAML Assertion Validation:
    During the SSO process, PingOne generates a SAML assertion that includes the SAML_SUBJECT along with other attributes.
    Druva validates this SAML assertion, specifically checking the SAML_SUBJECT to identify the user. If the UPN or email address is correctly set as SAML_SUBJECT, Druva can successfully authenticate the user and provide access to the appropriate resources.

  4. Simplified Configuration and Management:
    Setting the UPN or email address as SAML_SUBJECT in PingOne simplifies the integration process with Druva.
    It aligns with common best practices and reduces the chances of misconfiguration, ensuring a smoother SSO experience for end-users.

Did this answer your question?