Set Up Capella SSO Using PingOne
- Capella Operational
- how-to
Configure Single Sign-On (SSO) between PingOne and Couchbase Capella to allow your organization’s users to authenticate securely without managing separate credentials. This integration enables streamlined access management while maintaining enterprise-grade security.
Prerequisites
To configure Ping as an IdP, you need:
-
To enable SSO for your Capella organization.
-
A Ping account.
-
To be signed in to the Ping admin console as an admin.
Procedure
Choose the tab corresponding to your preferred authentication protocol.
-
SAML
-
OIDC
To configure federated and SSO authentication using SAML with Ping as your identity provider (IdP), you must complete three procedures in the following order:
Start by creating a Ping Application in the Ping admin console. You need the information resulting from this step to create a realm in Capella.
-
Create a key pair:
-
In the Ping admin console, click
. -
Click
. -
In the Create Key Pair form, enter the following:
-
Common Name: Enter a name for the new key pair.
-
Usage Type: Choose
Signing - Verification
. -
Organization: Enter an organization name.
-
Country: Enter your country.
-
-
Click Save & Finish.
-
-
Click Applications.
-
Create the application:
-
Click the plus sign icon.
-
Fill in the following fields:
-
Application Name: Enter a meaningful application name.
-
(Optional) Description: Add a description of the application.
-
(Optional) Icon: Add the Capella logo.
-
Choose Application Type: Select
SAML Application
.
-
-
Click Configure.
-
-
Start the SAML configuration:
-
Choose Manually Enter.
-
Add the following placeholders:
Field Value ACS URLs
Enter a placeholder, such as
https://example.com
. You’ll provide the real value in a later step.Entity ID
Enter a placeholder, such as
placeholder
. You’ll provide the real value in a later step. -
Click Save.
-
-
Add attributes:
-
Click the Overview tab.
-
Update the SAML configuration with signing key information:
-
Click the Protocol button containing the gear icon.
-
In the Configuration section, enter or edit the following fields:
Field Value Signing Key
Signing Algorithm
RSA_SHA256
-
Click Save.
-
-
Near the top right corner of the details panel, enable the application by clicking the toggle switch.
With a Ping application created, you need to create a realm in Capella using information from Ping.
-
In the Capella UI, click
. -
Click
. -
Complete the Create Realm page:
-
Copy the following information from your Ping configuration to Capella:
To find this information in the Ping admin console, go to . Find and click the application that you want to view. In the details panel, click the Configuration tab.Ping Field Capella Field Contents of
SAML Signing Certificate
Single Sign On Service
Sign-in Endpoint URL
-
Verify that the remaining SAML protocol settings are as follows:
Field Value Signature Algorithm
RSA-SHA256
Digest Algorithm
SHA256
SAML Protocol Binding
HTTP-POST
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you need to configure Ping to replace the placeholder values you used.
-
In the Ping admin console, open the application you created for Capella.
-
With the Overview tab open, click the Protocol button with the gear icon.
-
Edit the configuration settings:
-
Copy the following fields from your Capella realm configuration to the Ping configuration:
To find this information for your organization’s Capella realm, open the page. Listed on this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field Ping Field Callback URL
ACS URLs
Entity ID
Entity ID
-
-
Click Save.
-
Assign users to the application.
-
With the application details open, click the Access tab.
-
Add the groups whose members need access to Couchbase Capella. See the Application access control page of the Ping documentation for more detail.
-
To configure federated and SSO authentication using OIDC with Ping as your identity provider (IdP), you must complete three procedures in the following order:
Start by creating a Ping Application in the Ping admin console. You need information from this step to create a realm in Capella.
-
Click
. -
Click the icon.
-
Fill in the following fields:
-
Application Name: A unique name for the application.
-
(Optional) Description: Add a description of the application.
-
(Optional) Icon: Add the Capella logo.
-
Application Type: Select OIDC Web App.
-
-
Click Save.
-
On the Application screen, click the Resources tab.
-
Click Save.
With the application created in Ping, you need to create a realm in Capella using its information.
-
In Capella, click
. -
Click
. -
Copy the following information from your Ping application to Capella:
To find this information in the Ping admin console, go to . Find and click the application that you want to view. The Overview tab includes the OIDC Discovery URL, Client ID, and Client Secret information.Ping Field Capella Field OIDC Discovery Endpoint
OpenID Connect Discovery URL
Client ID
Client ID
Client Secret
Client Secret
-
Configure scopes:
Scopes determine which user information Capella requests from your identity provider. The
openid
,email
, andprofile
scopes are automatically included in the realm by default, so you do not need to add them.When adding additional scopes, separate each entry with a space.
-
Configure a default team and group mapping.
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you need to finishing configuring the Ping application.
-
In the Ping admin console, open the application you created for Capella.
-
Open the Configuration tab and click the Edit () icon
-
Change the Token Endpoint Authentication Method to Client Secret Post.
-
Copy the following fields from your Capella realm configuration to the Ping configuration:
To find this information for your organization’s Capella realm, open the page. Listed on this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field Ping Field Callback URL
Redirect URIs
-
Click Save.
-
Assign users to the application.
-
With the application details open, click the Access tab.
-
Add the groups whose members need access to Couchbase Capella. See the Application access control page of the Ping documentation for more detail.
-
-
When viewing your applications in
, enable the application by clicking the toggle switch.