Configure SSO with Ping Identity for your workspace

Warning

Workspace-level SSO is a legacy configuration. It can only be configured when unified login is disabled. When unified login is enabled, your workspace uses the same SSO configuration as your account.

If your account was created after June 21, 2023, unified login is enabled on your account by default for all workspaces, new and existing, and it cannot be disabled.

Databricks recommends enabling unified login on all workspaces. See Enable unified login.

This documentation has been retired and might not be updated.

This article shows how to configure Ping Identity as the identity provider for a Databricks workspace. To configure SSO in your Databricks account, see Configure SSO in Databricks.

Gather required information

  1. As a workspace admin, log in to the Databricks workspace.

  2. Click your username in the top bar of the Databricks workspace and select Settings.

  3. Click on the Identity and access tab.

  4. Next to SSO settings, click Manage.

  5. Copy the Databricks SAML URL.

Do not close this browser tab.

Configure Ping Identity

  1. In a new browser tab, log in to Ping Identity as an administrator.

  2. Inside the PingOne admin portal, click the Connections icon. It looks like a flow chart connector.

  3. Click +Add Application.

  4. Click Advanced Configuration.

  5. Next to SAML, click Configure.

  6. Set Application Name to Databricks, then click Next.

  7. For Provide App Metadata, click Manually Enter.

  8. Enter the Databricks SAML URL from Gather required information into the following fields:

    • ACS URL

    • Entity ID

    • SLO Endpoint

    • SLO Response Endpoint

    • Target Application URL

  9. Under Signing Key, select Sign Response or Sign Assertion and Response.

    Important

    Do not select Enable Encryption or Enforce Signed Authn Request.

  10. Set Assertion Validity to a value between 30 and 180 seconds. For more details, see Accounting for Time Drift Between SAML Endpoints in the Ping Identity knowledge base.

  11. Click Save and Continue.

  12. Under SAML Attributes, set PINGONE USER ATTRIBUTE to Email Address.

  13. Click Save and Close. The SAML application appears.

  14. Click Configuration.

  15. Click Download Metadata.

  16. Open the downloaded XML file in a text editor.

Configure Databricks

  1. Go back to the browser tab for Databricks.

  2. Click your username in the top bar of the Databricks workspace and select Settings.

  3. Click on the Identity and access tab.

  4. Next to SSO settings, click Manage.

  5. Set both Single Sign-On URL and Identity Provider Entity ID to the value of the Location attribute of the <SingleSignOnService> tag in the XML file you downloaded from Ping Identity.

  6. Set x.509 Certificate to the value of the <ds:X509Certificate> tag in the XML file you downloaded from Ping Identity.

  7. Click Enable SSO.

  8. Optionally, click Allow auto user creation.

Test the configuration

  1. In an incognito browser window, go to your Databricks workspace.

  2. Click Single Sign On. You are redirected to Ping Identity.

  3. Log in to Ping Identity. If SSO is configured correctly, you are redirected to Databricks.

If the test fails, review Troubleshooting.