With PingOne
- Last Updated: May 20, 2026
- 2 minute read
- MarkLogic Server
- Version 12.0
- Documentation
You can set up MarkLogic Server to use the vendor PingOne as your SAML external agent.
To set up PingOne to properly interface with MarkLogic Server, follow these steps while noting the information that you will need later as you go along:
-
Decide on or identify your application’s Assertion Consumer Service (ACS) URL. Example:
https://localhost:8010/. This URL will be the root of all requests that will require authentication and will be used for external security object configuration. -
Add a User record to your Directory. Example:
test-user@acme.local. See Adding a user. -
Add a Group record to your Directory. Example:
dh-admin. See Creating a group.- Note this value. You will use it as an external name during role configuration.
-
Add the User created in Step 3 to the Group created in Step 4. See Managing group membership.
-
Create a
SAMLapplication. See Adding an application.- Use the value from Step 1 for both
ACS URLandEntity ID.
- Use the value from Step 1 for both
-
On the application's configuration page,
- Download the
Signing Certificatefor external security object configuration. - Note the
Single SignOn Servicelink for external security object configuration. Example:https://auth.pingone.asia/a58...3c8/saml20/idp/sso. - Add PingOne's
Group Namesas your application'sgroupattribute. You may add more than one attribute, but onlyGroup Namesis required right now.
- Download the
Your PingOne Server is now set up to integrate with MarkLogic Server, and you have the information that you need to configure MarkLogic Server external security.
This table shows how the elements that you noted from the PingOne server map to fields on the MarkLogic Server External Security configuration page. It also includes the values used in the example setup:
PingOne element |
External Security configuration page field |
|---|---|
| Identity Provider's EXAMPLE: |
SAML Issuer |
| SAML Application's Attribute Mapping Entry EXAMPLE: |
SAML Attribute Name |
| SAML Application's EXAMPLE: |
SAML Entity ID |
SAML Application's |
SAML IDP Certificate Authority |
| SAML Application's EXAMPLE:
|
SAML Destination |
You can now set up MarkLogic Server integration through one of the methods described in this section.