Creating attributes for the client_id
, client_secret
, and active token
Create the attributes you’ll reference in the access token validation policy.
Steps
-
In the PingAuthorize administrative console, go to Trust Framework > Attributes.
-
In the PingFed Client section, create a
client_id
attribute:-
In the Parent list, select PingFed Client.
-
In the Value Settings section:
-
Select the Default Value checkbox and enter the client ID from the OAuth resource server that you want to use to validate the token in the field.
For example, authroize_rs.
-
In the Type list, select String.
-
-
In the Caching section:
-
In the Cache Strategy list, select No Caching.
-
-
-
In the PingFed Client section, create a
client_secret
attribute.-
In the Parent list, select PingFed Client.
-
In the Value Settings section:
-
Select the Default Value checkbox and enter the corresponding client secret from the OAuth resource server that you want to use to validate the token in the field.
-
In the Type list, select String.
-
-
In the Caching section:
-
In the Cache Strategy list, select No Caching.
-
-
-
Go to the SCIM2 section, and create a
TokenActive
attribute to resolve thePingFederate Introspection
service:-
In the Resolvers section:
-
In the Resolver type list, select Service, then select PingFederate introspection.
-
-
In the Value Settings section:
-
In the Type list, select Boolean.
-
-
In the Caching section:
-
In the Cache Strategy list, select No Caching.
-
-