Adjusting the OIDC policy configuration
Adjust the OIDC policy configuration to include the access token manager (ATM) and attributes you’ve configured.
You can find more information in the Configuring OpenID Connect policies section of the PingFederate documentation.
Steps
-
Go to Applications > OpenID Connect Policy Management and open the policy configuration you plan to use.
-
On the Manage Policy tab:
-
Make sure that you’ve configured a unique Policy ID and Name.
-
In the Access Token Manager list, select the ATM you configured in Configuring an access token manager.
-
Select the Include x.509 Thumbprint Header in ID token checkbox.
This configures the OIDC policy to expose the X5T header when PingFederate issues the
id_token
for Microsoft Entra ID.
You can find more configuration information in configuring policy and ID token settings in the PingFederate documentation.
-
-
On the Attribute Contract tab, make sure that the attribute contract includes
acr
,amr
, and any optional attributes you configured into the issued id_token:-
In the Extend the Contract section, enter
acr
. -
In the Action column, click Add.
-
Repeat this process for
amr
and any optional attributes that you extended the contract for in step 4 of Configuring an adapter instance. -
Click Next.
You can find more information about configuration options in Configuring the policy attribute contract in the PingFederate documentation.
-
-
On the Attribute Scopes tab, make sure that the
acr
andamr
attributes, plus any optional attributes, are returned with theopenid
scope:-
In the Scope list, select openid.
-
In the Attributes section, select the checkboxes for
acr
,amr
, and any optional attributes that you configured. -
In the Action column, click Add.
-
Click Next.
You can find more information about configuration options in Configuring attribute scopes in the PingFederate documentation.
-
-
On the Attribute Sources & User Lookup tab, click Next.
-
On the Contract Fulfillment tab, fulfill the attribute contract for
acr
,amr
,sub
, and any optional attributes that you configured.For example, to configure contract fulfillment for the
acr
attribute:-
In the Source list, select Access Token.
-
In the Value list, select acr.
-
Repeat for
amr
,sub
, and any optional attributes that you extended the contract for in step 4 of Configuring an adapter instance.-
For the
amr
attribute, in the Source list, select Access Token, and in the Value list, select amr. -
For the
sub
attribute, in the Source list, select Persistent Grant, and in the Value list, selectUSER_KEY
.
-
-
Click Next.
You can find more information about configuration options in Configuring ID token fulfillment in the PingFederate documentation.
-
-
(Optional) On the Issuance Criteria tab, configure the criteria for use with this OIDC policy.
You can find more information about configuration options in Defining issuance criteria for policy mapping in the PingFederate documentation.
-
On the Summary tab, click Save.