Configuring PingAccess to use Azure AD as the token provider
Configure PingAccess to use Azure AD as the token provider.
Before you begin
-
Install PingAccess and verify that you can access the administrative console. For information on installing PingAccess, see Installing and Uninstalling PingAccess.
The default credential set should be changed upon first usage. The default credentials for your PingAccess installation are:
Username: Administrator Password: 2Access
-
If your administrative node uses a proxy for HTTP requests to the token provider, select the HTTP Proxy in the System → Clustering section. For more information, see Configuring administrative nodes.
About this task
For more information on configuring the token provider, see Token provider.
Steps
-
Click Settings and then go to System → Token Provider → Common → OpenID Connect.
-
Go to Settings → System → Token Provider and select Common Token Provider.
-
-
In the Issuer field, enter the Microsoft Azure AD Directory ID.
To obtain the directory ID from Azure AD, in the Azure AD directory, go to Manage → Properties and copy the Directory ID value.
-
From the Trusted Certificate Group list,
Choose from:
-
Java Trust Store
-
Trust Any
-
-
Click Save.
Next steps
To get the most out of the solution, see Configuring token provider-specific options.