Exium’s Intelligent Cybersecurity Mesh provides secure access to distributed workforce and IoT devices, protecting businesses from malware, ransomware, phishing, denial of service, and botnet infections in one easy to use cloud service.
Ping Identity Exium integration handles users seamless access to Exium. Administrators can easily attach Exium security policy groups to Ping Identity users. Unique features of this integration are
This note explains how to configure Ping Identity Exium application settings and Exium Workspace settings so that Ping Identity Users can be synced with Exium Workspace in real time and SSO from Ping Identity can be used to sign-on to Exium Service.
Following steps elaborate Ping Identity SAML2 API Integration with Exium
As a first step, configure Ping Identity as Sign-in Type. Follow below steps.
Warning: Ensure that the Entity ID from the Exium portal is entered as the Entity ID in the Ping Identity Exium app, and the ACS URL is set correctly as the ACS URLs. Swapping these values will result in an SAML error when users attempt to sign in to Exium.

As a next step, you need to create Exium app on Ping Identity console. You can create Exium app on one of your existing environment or optionally you can create a new environment.
If you already have an existing environment which you want to use to create Exium app, you can skip this step.
If you want to create a new environment for Exium app, you can do so by following below steps




Follow below steps to create Exium application under one of the environments.


Warning: Ensure that the Entity ID from the Exium portal is entered as the Entity ID in the Ping Identity Exium app, and the ACS URL is set correctly as the ACS URLs. Swapping these values will result in an SAML error when users attempt to sign in to Exium.

As a next step, some attributes like email and given name should be mapped from Ping Identity to Exium App. Follow below steps to create this mapping



As a next step, Sign-in option on Exium Portal has to be saved by filling-in IDP Metadata XML URL. The metadata xml url is copied from Ping Identity console on previous step.
On Exium admin console On SCIM/SAML SSO Page, Paste IDP Metadata XML URL and click on Save as shown below.

As a next step, you can assign users to Exium app by following below steps

If you are part of admin group, you can access admin console through SSO. you can enter your workspace name on service portal by entering the workspace name. Browser opens one more tab for Ping Identity authentication. (Note: Some browsers block popups. You need to allow the popup to allow one more tab to be opened to take Ping Identity authentication).

After successful authentication, it’ll show the message that “User is successfully Verified.” You can close the tab, then you’ll be in admin console in the original tab where you have entered workspace name. If the SSO verified user is not part of admin user, it gives an error that you don’t have access.

If you have any issue during integration, contact us at support@exium.net or raise a ticket on https://exium.net/help-center/
If you would like to see how Exium can help defend your organisation, contact us at hello@exium.net