App Distribution for iOS, Android and Windows
DashboardStart for free
  • Updraft App Distribution Documentation
  • Microsoft App Center Alternative
    • Windows App Distribution
    • App Center Migration Tool
  • Welcome to Updraft!
    • What is Updraft?
  • Quickstart
    • Register your Organization
    • Your first app project
      • Upload your first app versions (builds)
      • Install your app
  • Dashboard
    • Create Projects
    • Latest received Feedbacks
    • Documentation
    • Usermanagement
      • Permission Groups
      • Tester Dashboard
    • Profile & User Account
      • Profile Preferences
        • Two-factor authentication
      • Personal token
      • Notifications
      • Organizations
      • Account Settings
      • Plan & Billing
        • Free Plan
        • Paid Plan (Pay-As-You-Go)
      • Security (Single Sign-On)
        • Single Sign-On with Okta
        • Single Sign-On with Google Worspace
        • Single Sign-On with Microsoft Entra
        • Single Sign-On with JumpCloud
        • Single Sign-On with Ping Identity
        • Custom SSO (SAML)
      • Developer Accounts
        • App Store Connect API
        • Google Play Connect API
  • Your Projects
    • Project Settings
      • Overview
      • Automatically clean up build binaries
      • Notification Integrations
        • Slack integration
        • Webhook integration
        • Microsoft Teams integration
        • Discord integration
        • WebEx integration
      • User & Permissions
    • App Overview & App Settings
      • Notifications
      • Security
      • Last uploaded build
      • Add another app to your project
      • Android App Bundle (AAB)
    • Builds and App versions
      • Build history / app version history
        • iOS Resigning
        • Android Resigning
      • Release Notes
      • Exchange already uploaded app version
      • Distribute and install a pre-release version of your app
        • App download page
    • Feedback
    • App Distribution
      • Testers & Distribution Groups
      • Distribute your app
        • Single Release
        • Beta Release (one link two apps)
        • Store
          • App Store Distribution
          • Play Store Distribution
      • Release History
      • Install an app distributed from Updraft
  • Integrations
    • Jenkins Plugin Updraft
    • Fastlane
    • Gradle
    • Teamcity with Gradle (Android)
    • Teamcity
    • GitLab CI/CD
      • GitLab iOS with Fastlane
      • GitLab app distribution for iOS builds
      • GitLab app distribution for Android builds
    • Bitrise
  • API
    • Upload API
    • Upload Apps with CURL
    • Rest API
      • Distribution group and Permission group API
  • Updraft SDK
    • Autoupdate
    • Integrating Updraft Android SDK
    • Integrating Updraft iOS SDK
    • Integrating Updraft Flutter SDK
  • Android
    • Unknown sources in Android
    • .apk installation on Samsung Browser
    • Android FAQ
    • 🪅Android Icon Troubleshooting
    • Google Play Store upload issues
  • iOS
    • Untrusted Enterprise Developer
    • Code Signing Explained (Certificates, Identifiers, Profiles – what?)
    • Registering a UDID for Ad Hoc Distribution
    • What does "App could not be installed at this time" mean?
    • iPadOS on Safari
    • iOS FAQ
  • Data Security
    • Data hosting in Switzerland
      • Swiss data privacy law
    • End to end data encryption
    • General Data Protection Regulation (GDPR)
    • Single Sign On (SSO)
    • Custom Storage
      • Google Cloud Storage
      • Custom S3 bucket
    • ISO 27001
  • What's New/ Changelog
  • Roadmap
  • FAQ
  • Contact us
Powered by GitBook
On this page
  • Step 1 - Obtain the SAML Provider Details from Updraft
  • Step 2 - Add a New App in Ping Identity
  • Step 3 - Configure Ping Identity Single Sign-On with SAML
  • Step 4 - Download the Metadata XML file from Ping Identity
  • Step 5 - Upload the .xml metadata to your Updraft Organization
  • Step 6 - verify the integration
  • Error handling
  • Required Attributes for Updraft SSO
  • Case Sensitivity for Email Addresses
  • Assertion Consumer Service (ACS) URL Mismatch
  1. Dashboard
  2. Profile & User Account
  3. Security (Single Sign-On)

Single Sign-On with Ping Identity

In this tutorial, you will learn how to integrate your Updraft Organization with your Ping Identity Users Directory through SAML. Please follow the next steps.

PreviousSingle Sign-On with JumpCloudNextCustom SSO (SAML)

Last updated 2 months ago

Step 1 - Obtain the SAML Provider Details from Updraft

Only Owner of an Updraft Organization is able to add an SSO Integration

  1. Open your Account Settings as an Owner

  2. Go to the Security Page

  3. Click Add new SSO

  4. Click CUSTOM SSO

  5. You will see now your SAML configuration

    1. Ensure the ACS URL is set to: https://getupdraft.com/saml2_auth/acs/

  6. Store them

Step 2 - Add a New App in Ping Identity

  1. Click on Applications.

  2. Then select the Application section and click on the blue circular + button at the top of the page.

  3. Enter your Application Name, select SAML Application, and click the Configure button when available.

  1. From the SAML Configuration, select Manually Enter, then enter your Single Sign On URL and Audience Restriction from Step 1.

  2. Click the Save Button.

Step 3 - Configure Ping Identity Single Sign-On with SAML

  1. From the Applications page, locate and select the application you just created, then enable the toggle switch.

  1. Select the application and go to the Attribute Mapping tab. Click the pencil icon to edit the mappings.

    1. For the saml_subject attribute, select Email Address from the PingOne Mappings drop-down and click + Add.

    2. Next, add email to the Attributes field, select Email Address from the drop-down, and click + Add.

    3. Next, add frist_name to the Attributes field, select Given Name from the drop-down, and click + Add.

    4. Then, add last_name to the Attributes field, choose Family Name from the drop-down, and click + Add.

    5. Then, add username to the Attributes field, choose Email Address from the drop-down, and click + Add.

    6. Finally, add groups to the Attributes field, select Group Names from the drop-down, and click + Add.

  2. Once configured, click the Save Button.

  1. On the Access tab:

    • If you want to restrict who can access the SSO app, create another user group in your Ping Identity console and assign it to the SSO app.

Step 4 - Download the Metadata XML file from Ping Identity

  1. Select the Configuration tab and click the pencil icon to edit the configuration. Choose the Sign Assertion & Response option, then click Save to apply your changes.

  1. Once the configuration is complete, you will need to click on the Download Metadata button, as this will download the Metadata XML to complete the integration in Updraft.

Step 5 - Upload the .xml metadata to your Updraft Organization

  1. Click Choose File and select your Metadata XML file

  2. Click Save

Step 6 - verify the integration

After following all the above steps, log in to your Updraft account to verify that you are now able to sign in with your Custom SSO (Ping Identity).

If the integration was successful:

  1. If you are opening your subdomain.getupdraft.com/login page you will see the Login with Custom SSO Button

  2. When your assigned Users click on the Login with SSO Button they will be redirected to the Ping Identity login page

  3. upon successful authentication with Ping Identity, your users will be logged into Updraft automatically and redirected to the dashboard page of Updraft

  4. A new account for your uses will be created in Updraft after they logged-in the first time

  5. Now you can assign projects and apps to your users.

If you encounter any issues, please refer back to the previous steps or reach out to the support team for assistance.

Error handling

Required Attributes for Updraft SSO

Updraft requires specific attributes to be included in the SAML assertion from your Identity Provider (IdP). If any of these attributes are missing or incorrectly mapped, authentication will fail.

Attribute Name

Required?

Expected Value

Description

saml_subject

✅ Required

Email Address

Used as the unique identifier for user authentication.

email

✅ Required

Email Address

Must be present and case-sensitive.

first_name

✅ Required

Given Name

The user's first name.

last_name

✅ Required

Family Name

The user's last name.

username

✅ Required

Email Address

Used for internal user management.

groups

✅ Required (if used)

Group Names

Used for role-based access control (RBAC).

🔍 Troubleshooting Missing Attributes

  • Error: User is not found in Updraft

    • Fix: Ensure that the email and saml_subject attributes are correctly mapped in your IdP.

  • Error: SSO login succeeds, but user has no permissions

    • Fix: Check if the groups attribute is included in the SAML assertion and mapped correctly in Updraft.

Case Sensitivity for Email Addresses

Updraft treats email addresses as case-sensitive. If the email address in the SAML assertion does not match the case exactly as stored in Updraft, authentication may fail.

🔍 Common Case Sensitivity Issues

Issue

Example

Fix

Email in SAML does not match stored case

John.Doe@company.com ≠ john.doe@company.com

Ensure the email attribute is consistently formatted in the IdP.

User exists but cannot log in

User Not Found error despite correct email

Normalize email casing in the IdP or update the stored email in Updraft.

🔍 Recommended Fix

  • Configure Ping Identity or other IdPs to always send emails in lowercase to Updraft.

  • Ensure that user records in Updraft match the exact email case as sent in SAML.


Assertion Consumer Service (ACS) URL Mismatch

The ACS URL tells the IdP where to send the authentication response. If this URL is incorrect, SSO will fail.

🔍 Fixing ACS URL Errors

Error Message

Cause

Fix

Invalid ACS URL

The IdP is sending the SAML response to the wrong URL.

Ensure the ACS URL is set to: https://getupdraft.com/saml2_auth/acs/

Audience Restriction Error

The SAML Audience does not match what Updraft expects.

Ensure the saml:Audience value matches https://getupdraft.com/.


Login to your

Ping Identity Console