System requirements and supported configurations
For the best possible experience, ensure your computer meets or exceeds the minimum system requirements and become familiar with the configurations supported for this release.
PingFederate 10.3 and later.
PingAccess 5.3.2 and later.
Platforms:
-
Microsoft Windows Server 2019
-
Microsoft Windows Server 2016
-
Red Hat Enterprise Linux ES 8.0
-
Red Hat Enterprise Linux ES 7.6
-
Red Hat Enterprise Linux ES 9.0
Browsers:
-
Chrome
-
Firefox
Databases:
-
MySQL 5.7+
-
PostgreSQL 11.5+
-
RDS (MySQL)
A demonstration-only, embedded H2 database is installed by default. Use the H2 database only for trial or training environments. It is not recommended to use the default H2 database in production. For testing and production environments, always use a secured external storage solution for proper functioning in a clustered environment. |
Java runtime environments:
-
Oracle Java 11 LTS
-
OpenJDK 11
-
OpenJDK 17
Docker:
-
Docker 23.0.1
-
Docker 19.03.13. Base image operating system: Alpine Linux 3.11.
-
Docker 18.09.0. Host operating system: Ubuntu 18.04 LTS, Kernal: 4.4.0-1052-aws 7.3.
Ping Identity accepts no responsibility for the performance of any specific virtualization software and in no way guarantees the performance or interoperability of any virtualization software with its products. |
Supported configurations
PingCentral is an orchestrator for PingFederate. Configurations are sourced from PingFederate to define PingCentral applications and templates. Configure each environment in advance and ensure you have working authentication policies with persistent grants, access token mappings, and access token managers (ATMs) in place before using PingCentral to promote new applications.
Review additional information regarding supported features, protocols, and frameworks before you get started:
General configurations
Configuration | Supported | Unsupported | ||||
---|---|---|---|---|---|---|
Single sign-on and user management |
|
|||||
Entitlements |
|
Assigning groups of users entitlements based on an external attribute, such as LDAP group membership. |
||||
Backup and restoration |
Saving the database and configuration files by copying the directories
|
Using an API to export PingCentral configuration information. |
OAuth and OIDC configurations
Configuration | Supported | Unsupported | ||
---|---|---|---|---|
Client authentication |
Using a client TLS certificate, private key JSON web token (JWT), or symmetric keys. |
|||
Grant types |
Using all OAuth and OIDC grant types. |
|||
Scopes |
All scopes and exclusive scopes referenced in the PingFederate client JSON file, which is obtained during the template creation process. |
|||
ATMs and OIDC policies |
Saving ATMs or OIDC policies into templates created from client applications that have them.
|
Saving or promoting access token mapping, persistent grants, policy contracts, or authentication policies. |
||
Selectors |
Connection set selectors. Clients can only be automatically connected to authentication policies via policy contracts. If your authentication logic requires use of a selector, add it in PingFederate. |
SAML 2.0 SP configurations
Configuration | Supported | Unsupported | ||
---|---|---|---|---|
Bindings |
Using POST bindings. |
Using artifact, redirect, or SOAP bindings. |
||
Profiles |
|
|||
Attribute mapping |
|
Mapping attributes from data sources, such as basic or URI. |
||
Policy contracts |
Referencing one policy contract per template. |
Referencing more than one policy per template.
|
||
Adapter mappings |
Use authentication policy contract mappings instead of adapter mappings. |
|||
Certificate management |
|
An SP certificate is required to promote a SAML 2.0 connection, but might be optional in future releases. |
PingAccess configurations
Configuration | Supported | Unsupported |
---|---|---|
Destination |
Both Agent and Site are supported. |
The destination is not promoted with the application but selected per environment. |
PingAccess application types |
All application types (Web, API and Web+API) are supported. |
The application type cannot be changed in PingCentral. |
Token provider |
PingFederate must be the token provider. |
Third-party token providers for PingAccess are not supported. |
Application resources |
Resources can be added and updated for each application. |
You can configure resources in Web applications with specific HTTP methods in PingAccess version 6.2 or later, but this feature is not yet supported in PingCentral. |
Resource ordering |
Automated and manual resource ordering are both supported. |
|
Identity mappings |
Identity mappings for all application types (Web, API and Web+API) are supported. |
Identity mappings are not promoted with the application but selected per environment. |
Virtual hosts |
Virtual hosts are supported. |
Virtual hosts are not promoted with the application but selected per environment. |
Policy |
Application and resource policies can be updated per application. |
New rules and rule sets cannot be created in PingCental. Virtual resources are available in PingAccess version 6.2 or later, but are not yet supported in PingCentral. Customized authentication challenge responses, which support single-page applications, are also available in PingAccess version 6.2 or later. Applications with this type of policy can be added to PingCentral, but cannot be promoted to another environment unless the authentication challenge policy also exists in the target environment. |