

# Configure Amazon Managed Grafana to use Ping Identity
<a name="AMG-SAML-providers-pingone"></a>

Use the following steps to configure Amazon Managed Grafana to use Ping Identity as an identity provider. These steps assume that you have already created your Amazon Managed Grafana workspace and you have made a note of the workspace's ID, URLs, and Region.

## Step 1: Steps to complete in Ping Identity
<a name="AMG-SAML-providers-pingone-step1"></a>

Complete the following steps in Ping Identity.

**To set up Ping Identity as an identity provider for Amazon Managed Grafana**

1. Sign in to the Ping Identity console as an admin. 

1. Choose **Applications**.

1. Choose **Add Application**, **Search Application Catalog**.

1. Search for the **Amazon Managed Grafana for SAML** application, then choose it and choose **Setup**.

1. In the Ping Identity application, choose **Next** to get to the SAML configuration page. Then make the following SAML settings:
   + For **Assertion Consumer Service**, paste in your **Service provider reply URL** from the Amazon Managed Grafana workspace.
   + For **Entity ID**, paste in your **Service provider identifier** from the Amazon Managed Grafana workspace.
   + Make sure that **Sign Assertion** is selected and that **Encrypt Assertion** is not selected.

1. Choose **Continue to Next Step**.

1. In **SSO Attribute Mapping**, make sure that the Amazon Managed Grafana attribute is in **Application Attribute** and that the Ping Identity attribute is in the **Identity Bridge Attribute**. Then make the following settings:
   + **mail** must be **Email (Work)**.
   + **displayName** must be **Display Name**.
   + **SAML\$1SUBJECT** must be **Email (Work)**. And then for this attribute, choose **Advanced**, set the **Name ID Format to send to SP** to **urn:oasis:names:tc:SAML:2.0:nameid-format:transient** and choose **Save**. 
   + Add in any other attribute that you would like to pass.
   + Add any other attributes that you would like to pass. For more information about the attributes that you can pass to Amazon Managed Grafana in the assertion mapping, see [Assertion mapping](authentication-in-AMG-SAML.md#AMG-SAML-Assertion-Mapping).

1. Choose **Continue to Next Step**.

1. In **Group Access**, choose which groups to assign this application to.

1. Choose **Continue to Next Step**.

1. Copy the **SAML Metadata URL** which starts with `https://admin- api.pingone.com/latest/metadata/`. You use this later in the configuration.

1. Choose **Finish**.

## Step 2: Steps to complete in Amazon Managed Grafana
<a name="AMG-SAML-providers-pingone-step2"></a>

Complete the following steps in the Amazon Managed Grafana console.

**To finish setting up Ping Identity as an identity provider for Amazon Managed Grafana**

1. Open the Amazon Managed Grafana console at [https://console.aws.amazon.com/grafana/](https://console.aws.amazon.com/grafana/home/).

1. In the navigation pane, choose the menu icon.

1. Choose **All workspaces**.

1. Choose the name of the workspace.

1. In the **Authentication** tab, choose **Setup SAML configuration**.

1. Under **Import the metadata**, choose **Upload or copy/paste** and paste the Ping URL that you copied in the previous procedure.

1. Under **Assertion mapping**, do the following:
   + Make sure that **I want to opt-out of assigning admins to my workspace** is not selected.
**Note**  
If you choose **I want to opt-out of assigning admins to my workspace**, you won't be able to use the Amazon Managed Grafana workspace console to administer the workspace, including tasks such as managing data sources, users, and dashboard permissions. You can make administrative changes to the workspace only by using Grafana APIs.
   + Set **Assertion attribute role** to the attribute name that you chose.
   + Set **Admin role values** to value corresponding to your admin users' roles.
   + (Optional) If you changed the default attributes in your Ping Identity application, expand **Additional settings - optional** and then set the new attribute names.

     By default, the Ping Identity **displayName** attribute is passed to the **name** attribute and the Ping Identity **mail** attribute is passed to both the **email** and **login** attributes.

1. Choose **Save SAML Configuration**.