diff --git a/assets/images/sso/ping-identity/2.png b/assets/images/sso/ping-identity/2.png
index b4cf4196c..f4790c46e 100644
Binary files a/assets/images/sso/ping-identity/2.png and b/assets/images/sso/ping-identity/2.png differ
diff --git a/assets/images/sso/ping-identity/3.png b/assets/images/sso/ping-identity/3.png
index 283442be9..64ebb6f50 100644
Binary files a/assets/images/sso/ping-identity/3.png and b/assets/images/sso/ping-identity/3.png differ
diff --git a/assets/images/sso/ping-identity/4.png b/assets/images/sso/ping-identity/4.png
index 0c3c4ac38..673f8c23e 100644
Binary files a/assets/images/sso/ping-identity/4.png and b/assets/images/sso/ping-identity/4.png differ
diff --git a/assets/images/sso/ping-identity/6.png b/assets/images/sso/ping-identity/6.png
index abad59c9b..e01dde7ad 100644
Binary files a/assets/images/sso/ping-identity/6.png and b/assets/images/sso/ping-identity/6.png differ
diff --git a/assets/images/sso/ping-identity/7.png b/assets/images/sso/ping-identity/7.png
new file mode 100644
index 000000000..c32cf9bfc
Binary files /dev/null and b/assets/images/sso/ping-identity/7.png differ
diff --git a/assets/images/sso/ping-identity/issuer-url.png b/assets/images/sso/ping-identity/issuer-url.png
new file mode 100644
index 000000000..18870a22b
Binary files /dev/null and b/assets/images/sso/ping-identity/issuer-url.png differ
diff --git a/assets/images/sso/ping-identity/select-ping.png b/assets/images/sso/ping-identity/select-ping.png
new file mode 100644
index 000000000..f97835678
Binary files /dev/null and b/assets/images/sso/ping-identity/select-ping.png differ
diff --git a/assets/images/sso/ping-identity/sso-attribute.png b/assets/images/sso/ping-identity/sso-attribute.png
new file mode 100644
index 000000000..ad91c9dfd
Binary files /dev/null and b/assets/images/sso/ping-identity/sso-attribute.png differ
diff --git a/assets/images/sso/ping-identity/sso-setup.png b/assets/images/sso/ping-identity/sso-setup.png
new file mode 100644
index 000000000..41f8e63e5
Binary files /dev/null and b/assets/images/sso/ping-identity/sso-setup.png differ
diff --git a/docs/lambdatest-sso-pingidentity-integration.md b/docs/lambdatest-sso-pingidentity-integration.md
index 3187757d6..7104719bf 100644
--- a/docs/lambdatest-sso-pingidentity-integration.md
+++ b/docs/lambdatest-sso-pingidentity-integration.md
@@ -46,7 +46,6 @@ LambdaTest provides seamless integration with Ping Identity through SAML (Securi
## Key Features of Ping Identity Integration:
- **SP-Initiated SSO :** Single Sign-On initiated from the LambdaTest platform.
- **IdP-Initiated SSO :** Single Sign-On initiated from Ping Identity.
-- **Group Assignment :** Manage user groups via Ping's group functionality.
## Prerequisites
Before configuring the integration, ensure you meet the following requirements:
@@ -55,13 +54,6 @@ Before configuring the integration, ensure you meet the following requirements:
- **SSO Enablement Request :** The admin of your LambdaTest organization must request SSO enablement.
> Raise a request via email at support@lambdatest.com or through LambdaTest’s 24/7 in-app chat support.
- **Ping Identity Admin Access :** You need administrative access to your Ping Identity account.
-- **Metadata File :** Download the SAML metadata file for your LambdaTest organization using the following URL:
-
- Replace `{organizationID}` with your organization's ID
-
- ```bash
- https://auth.lambdatest.com/organization/{organizationID}/saml/metadata
- ```
## Configuring LambdaTest & Ping Identity Integration
Follow the steps below to configure the SAML-based integration between LambdaTest and Ping Identity.
@@ -71,31 +63,46 @@ Log in to your Ping Identity account using admin credentials.
-### Step 2: Add a New Application
-- Navigate to the Applications menu on the toolbar.
-- Click on Add Application.
-
+### Step 2: Setup SSO in LambdaTest
-- In the Add Application window, select Create New App to create a new application for LambdaTest SSO integration.
-
+- Go to LambdaTest Authentication & SSO settings and click on **Setup SSO**.
+
-### Step 3: Import Metadata File
-Import the LambdaTest metadata file you downloaded earlier.
+- Enter Connection Name and Click on **Add New Connection**.
+
-
+- Select **PingFederate** as your identity provider (PingIdentity & PingFederate has identical setup from LambdaTest side).
+
-Upon importing, Ping Identity will automatically populate the following:
+### Step 3: Add a New Application in PingIdentity
+- Navigate to the Applications menu on the toolbar.
+- Click on Add Application.
+
-- ACS URLs (Assertion Consumer Service URLs)
-- Entity ID
-- Save the application to proceed.
+- In the Add Application window, select Create New App to create a new application for LambdaTest SSO integration.
+
-
+### Step 4: Add SAML configuration
+- In LambdaTest SSO setup copy the **ACS URLs** and **Entity ID**.
+
-### Step 4: Configure Attribute Mappings
-- Go to the Attribute Mappings tab of the created application.
+- In Pingidentity, select the **Manually Enter** option in **SAML Configuration** and enter **ACS URLs** and **Entity ID** copied from above step.
+
+
+### Step 5: Configure Attribute Mappings
+- Copy following attribute from Lambdatest SSO setup.
+
+- Go to the Attribute Mappings tab of the created application in PingIdentity.
- Update the saml_object attribute value from user_ID to emailaddress.
+- Add and update the other attributes
+
+
+### Step 6 : Upload Metadata URL & SSO Domain
+- SSO Domains (Comma-separated list of the domains that can be authenticated in the Identity Provider.)
+- Copy the **IDP Metadata URL** from PingIdentity
+
-
+- Go back to LambdaTest and paste the copied URL in the **Issuer URL** field and click on **Create Connection**:
+
After completing these configurations, your LambdaTest and Ping Identity integration for SSO will be ready to use. Both SP-initiated and IdP-initiated SSO flows will be enabled, and you can manage users and groups via Ping Identity.
\ No newline at end of file