Certificate Validation node
The Certificate Validation node validates a digital X.509 certificate collected by the Certificate Collector node.
Certificate validation rules
|
Compatibility
Product | Compatible? |
---|---|
Advanced Identity Cloud |
Yes |
PingAM (self-managed) |
Yes |
Ping Identity Platform (self-managed) |
Yes |
Inputs
This node requires an X509Certificate
property in the incoming node state.
Implement the Certificate Collector node as input to the Certificate Validation node.
Configuration
Property | Usage |
---|---|
Match Certificate in LDAP |
When enabled, PingOne Advanced Identity Cloud matches the collected certificate with a certificate stored in the identity store. Set the Subject DN Attribute Used to Search LDAP for Certificates to specify which LDAP property to search for certificate information. Default: Disabled |
Check Certificate Expiration |
When enabled, PingOne Advanced Identity Cloud checks if the collected certificate has expired. Default: Disabled |
Subject DN Attribute Used to Search LDAP for Certificates |
The attribute PingOne Advanced Identity Cloud uses to search the identity store for the certificate. The search filter is based on this attribute and the value of the Subject DN as it appears in the certificate. Default: |
Match Certificate to CRL |
When enabled, PingOne Advanced Identity Cloud checks if the collected certificate has been revoked according to a Certificate Revocation List (CRL) in the identity store. Define related CRL properties later in the node configuration. Default: Disabled. |
Issuer DN Attribute(s) Used to Search LDAP for CRLs |
The name of the attribute or attributes in the issuer certificate that PingOne Advanced Identity Cloud uses to locate the CRL in the identity store.
Default: |
HTTP Parameters for CRL Update |
Parameters PingOne Advanced Identity Cloud includes in any HTTP CRL call to the CA that issued the certificate. If the client or CA certificate includes the Add the parameters as key-value pairs in a comma-separated list (,).
For example, |
Cache CRLs in Memory |
When enabled, PingOne Advanced Identity Cloud caches CRLs in memory. If this option is enabled, Update CA CRLs from CRLDistributionPoint must also be enabled. Default: Enabled |
Update CA CRLs from CRLDistributionPoint |
When enabled, AM fetches new CA CRLs from the CRL Distribution Point and updates them in the identity store.
If the CA certificate includes either the Default: Enabled |
OCSP Validation |
When enabled, PingOne Advanced Identity Cloud checks the validity of certificates using the Online Certificate Status Protocol (OCSP). PingAM If you enable this option, the AM instance must be able to connect to the internet. You must also configure OCSP for AM under Configure > Server Defaults > Security > Online Certificate Status Protocol Check. Default: Disabled |
Certificate Identity Store |
PingAM Select the identity store (configured for the realm) that AM must search for certificates. If you select an identity store here, AM uses the connection details defined for that identity store and ignores all the server settings below this field. Advanced Identity Cloud Select the default identity store ( |
PingAM LDAP Server Where Certificates are Stored |
The LDAP server that holds certificates.
Enter the server details in the format To associate multiple AM servers in a site with corresponding LDAP servers, use the format |
PingAM LDAP Search Start or Base DN |
Valid base DN for the LDAP search, such as |
PingAM LDAP Server Authentication User and LDAP Server Authentication Password |
The credentials used to connect to the LDAP directory that holds the certificates. If you enable mTLS, the node ignores these credentials. Default Authentication User: |
PingAM mTLS Enabled |
Enables mTLS (mutual TLS) between AM and the directory server. When mTLS is enabled, the node ignores the values for LDAP Server Authentication User and LDAP Server Authentication Password. If you enable this property, you must:
Default: Disabled |
PingAM mTLS Secret Label Identifier |
An identifier used to create a secret label for mapping to the mTLS certificate in the secret store.
AM uses this identifier to create a specific secret label for this node.
The secret label takes the form For greater security, you should rotate certificates periodically. When you rotate a certificate, update the corresponding mapping in the realm secret store configuration to reflect this identifier. When you rotate a certificate, AM closes any existing connections using the old certificate. A new connection is selected from the connection pool and no server restart is required. |
PingAM Use SSL/TLS for LDAP Access |
When enabled, AM uses SSL/TLS to access the LDAP directory. Make sure that AM trusts the certificate from the LDAP server when enabling this option. Default: Disabled |
Outcomes
True
-
The node could validate the certificate.
When the outcome is
True
, add a Certificate User Extractor node to extract the values of the certificate. False
-
The node couldn’t validate the certificate. The journey follows this path when the node can’t validate the certificate and no more specific outcome is available.
Not found
-
The Match Certificate in LDAP property is enabled, but the certificate wasn’t found in the LDAP store.
Expired
-
The Check Certificate Expiration property is enabled, and the certificate has expired.
Path Validation Failed
-
The Match Certificate to CRL property is enabled, and the certificate path is invalid.
Revoked
-
The OCSP Validation property is enabled, and the certificate has been revoked.
Example
This example shows an authentication journey using a certificate as credentials.

-
The Certificate Collector node attempts to collect the certificate from the request body or the header.
-
If the node can collect the certificate, the journey proceeds to the Certificate Validation node.
-
If the node can’t collect the certificate, the journey proceeds to a Page node containing a Platform Username node and a Platform Password node to let the user authenticate with username/password credentials.
-
-
The Certificate Validation node attempts to validate the certificate based on the configuration of that node.
-
If the certificate can be validated, the journey proceeds to the Certificate User Extractor node.
-
If the certificate is invalid, the journey proceeds to the Failure node.
-
In all other cases, the journey proceeds to a Page node containing a Platform Username node and a Platform Password node to let the user authenticate with username/password credentials.
-
-
The Certificate User Extractor node extracts the user ID from the certificate and attempts to find a match in the identity store.
-
If the username can be extracted and a matching user is found in the identity store, the journey increments the login count and authenticates the user.
-
If the username can’t be extracted or no matching user is found in the identity store, the journey proceeds to the Failure node.
-