PingFederate Server

Managing IdP adapter grant mapping

Use the IdP Adapter Grant Mapping to map authentication source values into persistent grants.

Persistent grants and any associated attributes and their values remain valid until the grants expire or until PingFederate explicitly revokes or cleans them up.

About this task

The USER_KEY attribute is the identifier of the persistent grants.

The USER_NAME attribute presents the name shown to the resource owner on OAuth user-facing pages.

If extended attributes are defined in System → OAuth Settings → Authorization Server Settings, configure a mapping for each attribute.

You can optionally set up datastore queries to supplement values returned from the source.

This mapping configuration is suitable for the Authorization Code and Implicit grant types.

Steps

  1. Go to Authentication → OAuth → IdP Adapter Grant Mapping and perform one of the following actions.

Action Steps

Create a mapping

Select the source of the attributes from the list and click Add Mapping.

Modify an existing mapping

Select your mapping under Mappings.

Remove an existing mapping or cancel the removal request

Click Delete or Undelete under Action.

Before removing a mapping from your configuration, ensure that it is not used by your OAuth use cases. Any corresponding entries defined in Applications → OAuth → Access Token Mapping will also be removed.