Setting Up PingID SSO via SAML

Setup Instructions

Below describes how to set up PingID SSO for Single Sign-On with Codefresh using SAML. If you do not have the SAML option, please create a support ticket to enable SAML for the account.

Note: This is for PingID SSO and not PingID Federate. Steps can be used as a general guide for Ping Federate.

In Codefresh

  1. Navigate to Account Settings > Single Sign-On
  2. Select Add Single Sign-on > SAML
  3. Fill in the following:
    • Display Name: Whatever you want to call the integration
    • IDP Entry: enter fake data
    • Application Certificate: enter fake data
  4. Click Save as we need the information to be generated first before continuing.
  5. Click Edit
  6. Copy the Assertion URL that is now displayed


  1. Log into PingID and select the Environment
  2. Go to connections > Applications
  3. Click the + to add an application
  4. The name and description are to be whatever you want.
  5. Select SAML Application
  6. Click Configure
  7. Select Manually Enter
    • ACS URL: the Assertion URL we copied from Codefresh
    • Entity ID:
  8. Click Save
  9. Go to the Configuration Tab
  10. Download X509 Certificate or Metadata
  11. Click on Attribute Mappings
  12. Add the following mappings
    • email <- Email Address
    • firstName <- Given Name
    • lastName <- Family Name
  13. Toggle the Enable option to make this app available

Note: For PingID Federate you will need to add the follwing mapping: NameID <- Email Address

Back In Codefresh

  1. We are going to fill in the fields with the PingID SSO Information
  2. IDP Entry: this will be the will be the Single Signon Service URL in PingID SSO
  3. Application Certificate: Copy and paste the information for the Certificate
    • Note: you will get a warning when editing the Certificate section
    • You can use with or without the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- as long the Certificate data is there
  4. Click Save

Test SSO Connection

Now test the SSO with a test user in a different browser or private/incognito browser to make sure it is working

  1. Go to Account Settings > User & Teams
  2. Locate a test user
  3. On the SSO Column, select the SSO name to enable SSO for the user
  4. In a different browser or private/incognito browser window use the Corporate option to log in