Skip to content

PingFederate Enterprise Connection

PingFederate can serve as the SAML IdP for AuthAction.

In your PingFederate SP connection (or equivalent configuration), set the Assertion Consumer Service (ACS) URL to:

https://<tenant-name>.<region>.authaction.com/oauth2/saml/callback
Field in AuthActionWhere to find
IdP SSO URLPingFederate admin UI > IdP configuration > SSO Service URL (or your deployment’s sign-on endpoint)
Entity ID / IssuerPingFederate > Server Configuration > Entity ID (IdP entity ID)

Menu paths can vary by PingFederate version; use your server’s SAML metadata as the source of truth.

Step 1: Configure the connection in PingFederate

Section titled “Step 1: Configure the connection in PingFederate”
  1. Create or edit an SP Connection (or Browser SSO profile) that targets AuthAction.
  2. Register the ACS URL and SP Entity ID (AuthAction tenant URL).
  3. Ensure SAML assertions include a suitable Name ID (often email).
  4. Export or note the IdP SSO URL, Entity ID, and Signing Certificate.

Step 2: Configure PingFederate in AuthAction

Section titled “Step 2: Configure PingFederate in AuthAction”
  1. In AuthAction, go to Connections > Enterprise Connections.
  2. Select PingFederate.
  3. Enter the IdP SSO URL and Entity ID / Issuer.
  4. Add the IdP X.509 certificate if your deployment requires it for signature verification.
  5. Save.

Enable the connection for your applications and complete a full SSO test.