PingAccess

Creating attributes for the client_id, client_secret, and active token

Create the attributes you’ll reference in the access token validation policy.

Steps

  1. In the PingAuthorize administrative console, go to Trust Framework > Attributes.

  2. In the PingFed Client section, create a client_id attribute:

    1. In the Parent list, select PingFed Client.

    2. In the Value Settings section:

      1. Select the Default Value checkbox and enter the client ID from the OAuth resource server that you want to use to validate the token in the field.

        For example, authroize_rs.

      2. In the Type list, select String.

    3. In the Caching section:

      1. In the Cache Strategy list, select No Caching.

  3. In the PingFed Client section, create a client_secret attribute.

    1. In the Parent list, select PingFed Client.

    2. In the Value Settings section:

      1. Select the Default Value checkbox and enter the corresponding client secret from the OAuth resource server that you want to use to validate the token in the field.

      2. In the Type list, select String.

    3. In the Caching section:

      1. In the Cache Strategy list, select No Caching.

  4. Go to the SCIM2 section, and create a TokenActive attribute to resolve the PingFederate Introspection service:

    1. In the Resolvers section:

      1. In the Resolver type list, select Service, then select PingFederate introspection.

    2. In the Value Settings section:

      1. In the Type list, select Boolean.

    3. In the Caching section:

      1. In the Cache Strategy list, select No Caching.

Next steps