Microsoft EAM Integration Kit Configuring PingFederate to use the Microsoft EAM IdP Adapter Expand/Collapse All Configuring PingFederate to use the Microsoft EAM IdP Adapter Steps Enable static signing keys in the OAuth and OpenID Connect (OIDC) key configuration. Configure an access token manager (ATM) and create access token mappings. Adjust the OIDC policy configuration. Register an OAuth Client for Microsoft Entra ID in PingFederate. Use the Microsoft EAM IdP Adapter and a downstream MFA adapter, such as PingID, in the PingFederate authentication policy. Track HTTP request parameters in the PingFederate authentication policy. Configuring the downstream adapter to export amr as an additional attribute Enabling signing keys