This guide covers configuring Claude with PingOne or PingFederate as your identity provider. It applies to Team plans, Enterprise plans, and Console organizations.
Prerequisites
A Claude Team plan, Enterprise plan, or Console organization with a parent organization (see Important considerations before enabling SSO for Console parent org requirements)
Owner or Primary Owner role (Team and Enterprise) or Admin role (Console)
PingOne Environment Admin or PingFederate Admin access
Your domain verified in Claude's Identity and access settings — see Set up single sign-on for the full setup path including domain verification
Where to find your configuration values
The ACS URL, Entity ID, and SCIM credentials referenced below are provided in the WorkOS setup flow within your Identity and access settings — not by contacting Support.
Team and Enterprise plans: go to claude.ai/admin-settings/identity
Console organizations: go to platform.claude.com/settings/identity
Start the SSO setup flow there and keep it open alongside your Ping admin console as you work through the steps below.
PingOne setup
Step 1 — Create an application connection
In the PingOne admin console, go to Connections → Applications → + Add Application.
Select "SAML Application."
Name it "Claude" and click "Configure."
Step 2 — Configure SAML
Choose "Manually Enter" and provide the SP details from the WorkOS setup flow: ACS URL and Entity ID.
Download the PingOne IdP metadata and upload it in the WorkOS setup flow when prompted.
In Attribute Mappings, map
emailto the PingOne Email Address attribute.
Step 3 — Enable SCIM provisioning
Note: SCIM provisioning is available on Enterprise plans and eligible Console organizations only. If you're on a Team plan, skip this step — you can use JIT provisioning instead. See Set up JIT or SCIM provisioning.
In the application settings, go to the Provisioning tab.
Enable Outbound Provisioning and enter the SCIM endpoint URL and access token from the WorkOS setup flow.
Map
emails[primary].valueto the PingOne Email Address attribute—the same attribute used in SAML.
Critical: Ensure SAML and SCIM use identical attribute sources. See Ping Identity SSO/SCIM email mismatch for troubleshooting.
Step 4 — Assign population
Under Populations, assign the user population that should access Claude.
Enable the application and click "Save."
PingFederate setup
PingFederate configurations vary significantly by version and deployment. The general approach is:
Create a new SP Connection using the SP metadata from the WorkOS setup flow.
Configure the Attribute Contract to include
email.Map the email attribute in the Adapter Mapping to the person's primary email field.
For SCIM (Enterprise plans and eligible Console organizations only), configure an outbound provisioning channel targeting the SCIM endpoint from the WorkOS setup flow.
Contact our Support team for PingFederate-specific guidance.
Need help?
See Set up single sign-on for the full end-to-end flow including domain verification and choosing a provisioning approach. If you run into issues, contact our Support team with your Ping environment details.
