Big savings, Better ROI! Exclusive discounts on ManageEngine Products!* Boost your business *T&C apply
    Click here to shrink
    Click here to expand Click here to expand

    Configuring single sign-on to ADAudit Plus using Ping Identity

    Step 1: Configure ADAudit Plus in Ping Identity

    1. Log in to the Ping Identity portal.
    2. Click Applications → My Applications → SAML → Add Application → New SAML Application.
    3. On the Application Details page, enter Application Name, Application Description, and Category. You can choose to assign an application icon. Click Continue to Next Step.
    4. On the Application Configuration page, provide the ACS URL and Entity ID.
      Note: To find the values for the ACS URL and Entity ID, log in to the ADAudit Plus console, navigate to Admin → Administration → Logon Settings → Single Sign-On. Check the box next to Enable Single Sign-On, andselect SAML Authentication → Identity Provider (IdP) → Ping Identity. Copy the ACS/Recipient URL value, and paste it in the ACS URL field. Copy the Issuer URL/Entity ID value, and paste it in the Entity ID field.
    5. Click Save & Publish.
    6. Once the configuration is complete, the metadata file can be downloaded.

    Step 2: Configure Ping Identity in ADAudit Plus

    1. Log in to the ADAudit Plus web console with admin credentials. Navigate to Admin → Administration → Logon Settings → Single Sign-On. Check the box next to Enable Single Sign-On, and select SAML Authentication.
    2. Select Okta from the Identity Provider (IdP) drop-down. Under SAML Configuration Mode, select Upload Metadata File. Click Browse, and upload the metadata file obtained at the end of Step 1.
    3. If you want to enable single logout, follow these steps:
      • Copy the SP Logout URL in ADAudit Plus, and paste it in the Single Logout Endpoint field in Ping Identity’s SAML Application page.
      • Download the X.509 Certificate in ADAudit Plus. In Ping Identity’s SAML Application page, click on Browse next to Primary Verification Certificate, and upload the downloaded certificate.
    4. Click Save.

    To enable NTLM-based single sign-on

    Don't see what you're looking for?

    •  

      Visit our community

      Post your questions in the forum.

       
    •  

      Request additional resources

      Send us your requirements.

       
    •  

      Need implementation assistance?

      Try onboarding

       

    On this page

    Get download link