Secure Cloudsmith access with Ping Identity SAML SSO
Cloudsmith supports SAML 2.0 single sign-on through Ping Identity and PingFederate, letting your organisation control access to artifact repositories using the same identity infrastructure you already trust. Connect your Ping Identity environment to Cloudsmith to enforce centralised authentication, automate team provisioning via SAML Group Sync, and eliminate the risk of orphaned credentials.
How we support Ping Identity
Why teams integrate Cloudsmith with Ping Identity
Frequently asked questions
Cloudsmith supports any SAML 2.0-compliant identity provider, which includes PingFederate, PingOne, and PingOne for Enterprise. If your Ping product can be configured as a SAML IdP, it can be connected to Cloudsmith.
You create a SAML application in your Ping Identity admin console, configure the Assertion Consumer Service (ACS) URL and Entity ID from Cloudsmith, and then supply Ping's SAML metadata back into Cloudsmith's SSO settings. Full steps are in the Cloudsmith documentation.
Yes. Cloudsmith supports both SP-initiated SSO (where the user starts at Cloudsmith and is redirected to Ping Identity) and IdP-initiated SSO (where the user starts from the Ping Identity application portal).
SAML Group Sync lets you map a group attribute from your Ping Identity SAML assertion to a team in your Cloudsmith organisation. When a user authenticates via SSO, Cloudsmith reads the group attribute and automatically adds or removes the user from the matching team. You must configure all group mappings before enabling the feature.
Yes. Once SAML is configured, you can require SSO for all members of your Cloudsmith organisation. Users who attempt to log in with a username and password will be redirected to your Ping Identity IdP instead.
At minimum, Cloudsmith requires the user's email address, passed as the SAML NameID or as a mapped attribute. Additional attributes such as group membership are needed if you want to use SAML Group Sync for automatic team provisioning.
Once a user's account is disabled or removed in Ping Identity, they will be unable to authenticate via SAML on their next login attempt. Cloudsmith does not independently maintain a separate credential that would allow continued access after the IdP account is revoked.
No. SSO is configured at the organisation level in Cloudsmith. Once Ping Identity is connected to your organisation, the authentication policy applies to all repositories and teams within that organisation.
Yes, if SAML Group Sync is enabled and a user's SAML assertion does not include a mapping for a team they are currently in, they will be removed from that team on next login. Cloudsmith recommends configuring all group mappings before enabling Group Sync to avoid unintended access removal.
SAML SSO is available on Cloudsmith's enterprise plans. Contact the Cloudsmith sales team to confirm which plan tier includes SSO and SAML Group Sync for your organisation's requirements.