Configuring PingAccess to use Microsoft Entra ID as the token provider
Configure PingAccess to use Microsoft Entra ID (formerly Microsoft Azure AD) as the token provider.
Before you begin
-
Install PingAccess and verify that you can access the administrative console. You can find more information about installing PingAccess in Installing and Uninstalling PingAccess.
The default credential set should be changed upon first usage. The default credentials for your PingAccess installation are:
Username: Administrator Password: 2Access
-
If your administrative node uses a proxy for HTTP requests to the token provider, select the HTTP Proxy in the System > Clustering section. Learn more in Configuring administrative nodes.
About this task
You can find more information about configuring the token provider in Token provider.
Steps
-
Click Settings, then go to System > Token Provider > Common > OpenID Connect.
-
Go to Settings > System > Token Provider and select Common Token Provider.
-
-
In the Issuer field, enter the Microsoft Entra ID Directory ID.
To obtain the directory ID from Microsoft Entra ID, in the Microsoft Entra ID directory, go to Manage > Properties and copy the Directory ID value.
-
From the Trusted Certificate Group list,
Choose from:
-
Java Trust Store
-
Trust Any
-
-
Click Save.
Next steps
To get the most out of the solution, see Configuring token provider-specific options.