Integrating PingID requires setting up the configuration in the admin portal and in Azure AD.
Setting up PingID MFA for Microsoft Azure AD Conditional Access involves the following steps:
- In the admin portal, set up the integration, including attribute mapping.
- In Azure AD:
- Create a PingID MFA custom control.
- Create a PingID MFA conditional access policy.
- Optionally apply a PingID MFA policy to the Azure AD integration.
Default attribute mapping is based on the attributes that Azure sends to PingOne during the authorization request to trigger PingID MFA and includes the following attributes.
PingID attribute | Azure AD attribute |
---|---|
|
|
|
|
|
|
The conditional access policy is created and is shown in the Azure Policies list.
For information about applying a PingID MFA policy to your Azure AD integration, see Configuring an app or group-specific authentication policy. The Azure AD app will appear in the PingID policy app list.