Skip to content

SSO JIT provisioning using Ping Identity

Note

Starting from version 1.54, SSO OIDC support is available, and the term SAML JIT has been renamed to SSO JIT.

License

The Lightrun SSO JIT feature is only available to users on our Enterprise plan; please contact our Support team for more information.

Lightrun supports JIT (Just-In-Time) user provisioning capabilities to Ping Identity. Provisioning SAML JIT accounts using Ping Identity involves setting up a seamless and automated user account creation process for applications integrated with Ping Identity.

By configuring JIT provisioning, administrators can ensure that when users log in to a web application for the first time via Single Sign-On (SSO), their account is automatically created based on the information passed through SAML assertions from Ping. This eliminates the need for manual account creation during onboarding, significantly reducing administrative overhead and improving the user experience.

To set up SSO JIT provisioning using Ping, first set up the Lightrun Application within Ping Identity. This involves defining the necessary user attributes and mappings that the service provider (the web application) requires.

Once configured, when a user authenticates through Ping, the system sends the relevant user attributes—such as name, email—in the SAML response to Lightrun. If the user does not already have an account, the application uses this information to create one automatically, allowing the user immediate access without further intervention.

Prerequisite: Set up Lightrun SSO in Ping Identity

Set up the Lightrun application in Ping for the SSO integration using one of the following SSO protocols:

Step 1: Configure SAML Attributes in Ping Identity for Lightrun

  1. Sign in to Ping Identity.
  2. In the Administration console, click the Application tab.
  3. Under Applications, select the you created for the SSO integration.
  4. Select the Attribute Mappings tab.

    Attribute Mappings

  5. Add the following attribute statements with the indicated Name and value attributes.

    Name Value
    firstName user.firstName
    lastName user.lastName
  6. Click Save.

    To synchorize the attribues, they must be defined for your user. Additionaly, the first name and last name may differ from your display name.

Step 2: Enable SAML JIT Provisioning in Lightrun

  1. Log in to your Lightrun Management Portal.

  2. Click Settings on the top right-hand side of your screen to navigate to the Identity and Access Management tab > Identity Configuration.

  3. Scroll down to the Provisioning section and select the appropriate option based on your version:

    • Version 1.54 and later:

      Click the SSO JIT toggle to enable SSO JIT.

      Enable JIT Provisioning

    • Version 1.53 and earlier:

      Click the SAML JIT toggle to enable SAML JIT.

      Enable JIT Provisioning

  4. Click Save.

Guidelines for managing users using JIT provisioning

When managing users through JIT provisioning, the following guidelines apply:

  • Provisioning Method

    Only one provisioning method can be used at a time.

  • Identity management integration

    Only a single Identity Management (IdM) system can be set with SSO JIT.

  • Adding users

    When a user is provisioned through Ping Identity, they are automatically added to the Lightrun Management Portal and flagged as JIT-provisioned.

  • Removing users

    Removing a user from JIT provisioning will not remove the user from Lightrun; manual removal is required.

  • Default Pool Assignment

    JIT-provisioned users are automatically added to the default Agent Pool and assigned user-role permissions.

  • Roles and Permissions

    Lightrun-specific roles and permissions must be assigned directly within the Lightrun Management Portal. Users can be assigned to different agent pools, inheriting the roles and permissions associated with those pools.


Last update: March 11, 2025