Adjusting the OIDC policy configuration
Adjust the OIDC policy configuration to include the access token manager (ATM) and attributes you’ve configured.
You can find more information in the Configuring OpenID Connect policies section of the PingFederate documentation.
Steps
-
Go to Applications > OpenID Connect Policy Management and open the policy configuration you plan to use.
-
On the Manage Policy tab:
-
Make sure that you’ve configured a unique Policy ID and Name.
-
In the Access Token Manager list, select the ATM you configured in Configuring an access token manager.
-
Select the Include x.509 Thumbprint Header in ID token checkbox.
This configures the OIDC policy to expose the X5T header when PingFederate issues the
id_tokenfor Microsoft Entra ID.
You can find more configuration information in configuring policy and ID token settings in the PingFederate documentation.
-
-
On the Attribute Contract tab, make sure that the attribute contract includes
acr,amr, and any optional attributes you configured into the issued id_token:-
In the Extend the Contract section, enter
acr. -
In the Action column, click Add.
-
Repeat this process for
amrand any optional attributes that you extended the contract for in step 4 of Configuring an adapter instance. -
Click Next.
You can find more information about configuration options in Configuring the policy attribute contract in the PingFederate documentation.
-
-
On the Attribute Scopes tab, make sure that the
acrandamrattributes, plus any optional attributes, are returned with theopenidscope:-
In the Scope list, select openid.
-
In the Attributes section, select the checkboxes for
acr,amr, and any optional attributes that you configured. -
In the Action column, click Add.
-
Click Next.
You can find more information about configuration options in Configuring attribute scopes in the PingFederate documentation.
-
-
On the Attribute Sources & User Lookup tab, click Next.
-
On the Contract Fulfillment tab, fulfill the attribute contract for
acr,amr,sub, and any optional attributes that you configured.For example, to configure contract fulfillment for the
acrattribute:-
In the Source list, select Access Token.
-
In the Value list, select acr.
-
Repeat for
amr,sub, and any optional attributes that you extended the contract for in step 4 of Configuring an adapter instance.-
For the
amrattribute, in the Source list, select Access Token, and in the Value list, select amr. -
For the
subattribute, in the Source list, select Persistent Grant, and in the Value list, selectUSER_KEY.
-
-
Click Next.
You can find more information about configuration options in Configuring ID token fulfillment in the PingFederate documentation.
-
-
(Optional) On the Issuance Criteria tab, configure the criteria for use with this OIDC policy.
You can find more information about configuration options in Defining issuance criteria for policy mapping in the PingFederate documentation.
-
On the Summary tab, click Save.