Estimated time to complete: 15 minutes
Arrow offers deep integration with PingID, with the ability to integrate SSO with SAML, plan member sync, and group sync using SCIM. It is possible to do only SSO or only SCIM provisioning, but we recommend doing both for the best experience.
Check PingID documentation for any limitations and additional information.
More about SSO and SCIM
More about SAML-based SSO with PingID
Prerequisites
To complete this setup, you need admin permission for:
- Arrow Admin Console
- Ping Identity Active Directory (Identity Provider)
- Your Public DNS provider (for domain verification)
Table of Contents
- Step 1: Register a New Application in PingID
- Step 2: Configure PingID for SAML SSO
- Step 3: Download PingID Metadata
- Step 4: Configure Arrow with PingID Metadata
- Step 5: Verify your domain in DNS Provider
- Step 6: Assign Users in PingID
- Step 7: Test your SSO configuration
- Step 8: Enable SSO for all users
Set up Group SAML Provisioning
- Step 1: Set up Group Provisioning with SAML in PingID
- Step 2: Set up Group Provisioning with SAML in Arrow
Set up SSO
Step 1: Register a new application in PingID
- Log in to your Ping Identity Admin Console.
- Navigate to Applications. Select + Add Application.
Step 2: Configure PingID for SAML SSO
-
Choose SAML as the application type and set up the application name as Arrow SSO.
- Select Configure.
- For SAML configuration, select Manually enter.
- For ACS URL enter
https://sso.nitro.dashlane.com/saml/callback
- For Entity ID, enter
dashlane-nitro-sso
- Save the changes
- For ACS URL enter
- Under Attribute Mappings select Email Address for the PingOne Mappings and Save.
Step 3: Download PingID Metadata
- In the Overview tab, select Download Metadata.
- Enable the toggle on the top right corner to activate the application.
- Open the XML metadata file downloaded to your computer using Notepad on Windows or TextEdit on Mac, for example.
- Select all and copy the contents of the XML file.
Step 4: Configure Arrow with PingID Metadata
- Log in to the Arrow Admin Console
- In the Integrations section of the left menu, select Single sign-on. If you've already started the setup, select Edit. Otherwise, select Set up Confidential SSO.
- Go to Step 2: Save your IdP metadata and paste the XML metadata copied earlier.
- Select Save.
Step 5: Verify your domain in DNS Provider
- In Step 3: Verify your domain(s) in the Admin Console, enter your company email domain, and select Verify domain. Note the copy buttons you'll use to copy the hostname and TXT values to your public DNS provider.
- In a new browser tab, navigate to your Public DNS provider and Add a TXT Record. The exact steps vary depending on your provider.
- Paste the Host Name and TXT Value from the Arrow Admin Console into the new TXT record, and select Save.
- After you've entered the record, wait a few minutes, and in the Arrow Admin Console, select Verify domain.
Public DNS changes can take up to 24 hours, but most new records take 5 minutes or less. If it doesn't work the first time, wait a few minutes and select Verify domain again.
After the domain is verified, a green checkmark appears. Repeat the steps for any additional domains in your SSO tenant you want to enable for SSO. We don't support linking multiple SSO providers to a single Arrow plan.
(Optional) Just in Time Provisioning
You can turn on Just in Time Provisioning to automatically add any employee with your verified domains at their first login attempt.
Before you turn on Just in Time Provisioning:
- Ensure your plan members have already been added to the Arrow SAML application in your IdP.
- After you turn it on, they can install the Arrow Smart Extension and create their account.
- If your plan is out of seats, members won't be able to log in until you buy more seats.
- If you’re using Just in Time Provisioning along with another automatic provisioning method like SCIM or AD sync, make sure to add all of your plan members to your synced groups. Otherwise, plan members who aren’t added to synced groups will be removed the next time the directory syncs.
More about Just in Time Provisioning
Step 6: Assign Users in PingID
- In Ping Identity, open the Arrow application and select the edit icon under Access.
- Select the Group of Users you want to have access to Arrow and Save the changes.
Step 7: Test your SSO configuration
- Return to the Arrow Admin Console and perform a Test connection.
- A success message appears if SSO was set up as expected.
If you see an error message, you can open a ticket through our support chatbot.
Step 8: Enable SSO for all users
- After testing is successful, activate SSO in Arrow Step 4: Activate SSO for verified domains.
- Notify members about the new SSO login method. Members with an account created with a Master Password must do a final login with the Master Password before activating SSO.
- Ensure that members can log in with their PingID credentials.
To see how the process works for plan members, refer to this article: Migrate your existing plan members to SSO
Set up User SCIM Provisioning
Step 1: Generate SCIM API Token in Arrow
- Log in to the Arrow Admin Console
- In the Integrations section, select Provisioning and then Confidential Provisioning.
- Select Set up or Edit if you've already started the setup.
If this option is grayed out and unavailable, you either need to set up Confidential SSO first, or you've already set up Self-hosted SSO, SCIM, or Active Directory.
- In Step 1: Generate SCIM API token, select Generate Token.
- Copy the SCIM API token in Step 2: Copy token.
- Turn on the toggle for Step 3: Activate automatic user provisioning.
Step 2: Generate SCIM API Token in PingID
- Open the PingIdentity Admin Console and open the Provisioning tab under Integrations
- Select the plus icon next to Provisioning and select New Connection. Select Identity Store.
- Select SCIM Outbound and Next.
- Add a name to the connection — suggestion: Arrow User SCIM — and select Next.
- Copy the SCIM Endpoint URL from the Arrow Admin Console and enter the value under the SCIM Base URL.
- Select OAuth 2 Bearer Token as the Authentication Method.
- For OAuth Acess Token, enter the SCIM API token copied from the Arrow Admin Console.
- Select Test Connection
Note: The connection test will fail if you haven't first completed Step 1: Generate SCIM API Token in Arrow in full.
Set up Confidential Group Provisioning with SAML
Step 1: Set up Group Provisioning with SAML in PingID
Note: The steps below are to configure Group SAML provisioning using PingFederate
- Select Identity Provider, then SP Connections, then Arrow, and then Identity Mapping. Then select Next.
- For Extend the Contract, enter dashlaneSharingGroups.
- For Attribute Name Format enter basic.
- Select Next.
- Select Adapter Instance Name, then Description, then LDAP, and dashlaneSharingGroups:
- For Source, select Expression from the drop-down list.
-
For Value, enter this code:
#groupName = new java.util.ArrayList(), #groups = #this.get("ds.memberOf")!=null ? #this.get("ds.memberOf").getValues() : {}, #i= 0, #groups.{ #group = new javax.naming.ldap.LdapName(#groups[#i]), #cn = #group.getRdn(#group.size() - 1).getValue().toString(), #group.toString().matches(".*INSERT-MATCHING.*") ? (#groupName.add("INSERT-GROUP-NAMES-YOU-WANT-TO-SYNC-HERE")): null, #i = #i + 1 }, new org.sourceid.saml20.adapter.attribute.AttributeValue(#groupName)
- Select Update the expression and then select Next.
Note: If you get an error message during this step, go back to Data Store. Select Next. Then select Show All Attributes and MemberOf from the drop-down lists. Then select Add Attribute, then Next three times, and then Save.
- Select Cluster Management. Then select Replicated Configuration and Done.
Step 2: Set up Group Provisioning with SAML in Arrow
- Log in to the Arrow Admin Console
- Go to Integration, select Provisioning, and select Confidential Provisioning.
- Select Set up or Edit if you've already started the setup.
- Scroll down to the Group Provisioning section.
- Turn on Group Provisioning in Step 2: Activate group syncing.
- Once group provisioning has been configured, all plan members will be added
- Your plan members may need to log in to Arrow to see if changes will be reflected in the Admin Console
- As a plan admin, you won't be added to the groups. You'll continue to use your primary password to log in
- To see the changes in the Groups tab in the Arrow Admin Console, force log in to the Admin Console if you don't see the groups
- Your plan members can accept group invitations through the invite email or by selecting the Notifications icon, shown as a bell, in the Arrow app
Troubleshoot Arrow with PingID
(SSO) Error message: We couldn't verify your SSO connection
Error when testing the connection with Arrow in the Admin Console. You might also see this error when trying to save the metadata.
How to fix
- Confirm you're opening and logging in to the Admin Console from the Arrow Smart Extension.
- If your IdP's admin portal is open, log out of your admin account on PingID and close the browser tab before testing the connection with Arrow again.
- If the error persists, contact our Support team.
Contact Support
Please contact our Support team if you encounter any issues or have questions about this process.
Comments
0 comments
Article is closed for comments.