Example: Setting up custom mapping for Ping Identity
Last updated
Last updated
More information
Snyk privacy policy© 2024 Snyk Limited | All product and company names and logos are trademarks of their respective owners.
This page explains how to configure the custom mapping of roles for Ping Identity using Legacy custom mapping.
This guide assumes your Ping Identity application is configured and functional.
Any step on the Snyk side in setting up the Enterprise application must be performed by your Snyk contact, as self-serve SSO does not accommodate custom mapping.
In your application configuration, select Attribute mappings and click the pencil to edit the attributes.
Select +Add and enter the following attribute, then save the change,
roles: Group Names
In the left menu, select Identities/Groups and add the Snyk Groups needed following the syntax explained on the Cusom Mapping Option page.
If you so not select a Population at the bottom of the previous screen, ensure that you assign the Group to the user(s) who should be part of the role assignment in Snyk. If you select a Population, all users in that population will inherit the permissions of the assigned Snyk role.
To finalize the process, reach out to your Snyk contact to validate that the SAML payload contains the role array and to enable the custom mapping feature.