Authentication requirements
A relying party (RP) can have different authentication requirements for different protected resources. For example, a financial services provider accepts username and password authentication to create an account, but requires multi-factor authentication to download bank account statements.
PingOne Advanced Identity Cloud lets you associate requirements with authentication journeys. RPs specify the authentication requirements in their requests, and PingOne Advanced Identity Cloud uses the associations to authenticate the end user with the requested journey and honor the requirements.
PingOne Advanced Identity Cloud communicates the honored requirements by optionally returning claims in ID tokens. It uses the following standard claims:
-
An authentication context class reference (
acr
) claim holds a case-sensitive string identifying the class of authentication methods or procedures the authentication process satisfied. For example, an identifier for the authentication journey the end user completed successfully. -
An authentication method references (
amr
) claim holds a JSON array of strings identifying the authentication methods satisfied. For example, an indication the end user has authenticated with a username-password combination and a one-time password.
The acr
claim
The acr
claim holds a case-sensitive string you configure in the OAuth 2.0 provider service.
PingOne Advanced Identity Cloud maps acr
keys to authentication journeys to avoid directly exposing the journey names.
PingOne Advanced Identity Cloud doesn’t add the acr
claim to ID tokens by default.
The RP must request authentication contexts and PingOne Advanced Identity Cloud must authenticate the end user.
The acr
claims can be voluntary or essential.
Voluntary claims
RPs request voluntary acr
claims for optional authentication mechanisms to improve the user experience.
They do this in one of the following ways:
-
Specify the authentication mechanism in the
acr_values
parameter for a request to the/oauth2/authorize
endpoint. -
Specify the authentication mechanisms in the JSON format
claims
parameter for a request to the/oauth2/authorize
endpoint. -
Rather than specifying the mechanisms in the request, rely on Default ACR values in the RP client profile.
Find the field in the Advanced Identity Cloud admin UI under Applications > Client ID > Sign On > General Settings > Show advanced settings > Authentication.
The default
acr
values are the keys of the mapping set when you Configureacr
claims. The JSON response from the /oauth2/.well-known/openid-configuration endpoint lists the keys asacr_values_supported
strings; for example:"acr_values_supported": ["username-password"]
Any mechanisms the RP specifies in the request override the default
acr
values.
Essential claims
RPs request essential acr
claims for required authentication mechanisms.
RPs request essential acr
claims by specifying the authentication mechanisms in the JSON format
claims
parameter for a request to the /oauth2/authorize
endpoint.
Essential claims resemble, but are unrelated to, step-up authentication.
Configure acr
claims
-
Under Native Consoles > Access Management, go to Realms > Realm Name > Services > OAuth2 Provider > Advanced OpenID Connect.
-
Enable Enable "claims_parameter_supported" to let RPs request
acr
claims using theclaims
parameter. -
In the OpenID Connect acr_values to Auth Chain Mapping box, map keys to authentication journey identifiers.
The following example maps
username-password
to the Login journey:The acr-key mapped to the journey PingOne Advanced Identity Cloud uses to authenticate the end user becomes the value of the
acr
claim in the resulting ID token. -
Save your changes.
Request processing
When an RP requests authentication contexts, PingOne Advanced Identity Cloud initially determines the requested journey.
It uses the first context for which it has a valid mapping.
For example, if the RP requests push otp username-password
and PingOne Advanced Identity Cloud has mappings only for otp
and username-password
,
PingOne Advanced Identity Cloud chooses otp
to authenticate the end user.
The following table describes how PingOne Advanced Identity Cloud processes the request:
Scenario | Voluntary claims result | Essential claims result |
---|---|---|
The end user isn’t authenticated. |
Authenticate with the requested journey. |
Authenticate with the requested journey. |
The end user is authenticated with the requested journey. |
Don’t reauthenticate. |
Reauthenticate with the requested journey. On success, delete the original session and create a new session. |
The end user is authenticated with a different journey. |
Reauthenticate with the requested journey. On success, delete the original session and create a new session. |
|
The request specifies an unmapped |
Continue the grant flow without returning an error. |
Return an error and redirect to the |
After authenticating the end user, PingOne Advanced Identity Cloud returns an ID token whose acr
claim has one of the following values:
0
(zero)-
The RP requested an unmapped voluntary claim.
acr-key
-
The end user authenticated with the journey mapped to the acr-key.
If authentication involves more than one journey, the acr-key reflects the last mapped journey.
The amr
claim
The amr
claim holds an array of strings identifying families of authentication methods.
You can map an amr
session property to amr
values using the Set Session Properties node.
Then update the user info claims script to retrieve the amr
values mapped to the amr
session property.
When the end user authenticates with a journey using the node, PingOne Advanced Identity Cloud includes the amr
claim in the ID token it
issues.
Configure amr
claims
Configure an authentication journey
-
Update an authentication journey to include the Set Session Properties node, for example, update the
acr
claims journey. -
On the Set Session Properties node, configure a key to identify the
amr
values, for exampleamr
.As its value, enter a string to identify the authentication method satisfied. For example,
otp
.Example: Configure the amr session property
-
Save your changes.
Configure the user info claims script
This task describes how to create a new script to retrieve the amr
values mapped to the amr
session property.
-
In the Advanced Identity Cloud admin UI, go to Scripts > Auth Scripts > + New Script, and create a new OIDC Claims script.
-
Name the script
Demo OIDC claims
. -
Edit the default JavaScript as follows:
Add the
amr
claim details before thereturn computedClaims;
line. For example:if (session !== null && session !== undefined) { var amrValues = [session.getProperty("amr")]; computedClaims.put("amr", amrValues) } return computedClaims;
-
Save your changes.
The new user info claims script is now ready to retrieve amr
values mapped to the amr
session property.
Allowlist the session property
Provide access to the amr
session property to allow it to be output in the ID token.
-
Under Native Consoles > Access Management, select Realms > alpha > Services > Session Property Whitelist Service.
-
Add
amr
to the Allowlisted Session Property Names field. -
Save your changes.
Configure the OAuth2 provider to use the user info claims script
Perform this task to set up an OAuth2 provider to use your script.
-
Configure the OAuth 2.0 provider service and ensure the following properties are set:
- OIDC Claims Plugin Type
-
SCRIPTED
- OIDC Claims Script
-
Demo OIDC claims
-
Save your changes.
Configure the provider to return claims in the ID token
Perform this task to configure the OAuth2 provider to always return scope-derived claims in the ID token.
This option is disabled by default because of the security concerns of returning claims that may contain sensitive user information. Learn more in Request claims in ID tokens. |
-
Under Native Consoles > Access Management, select Realms > alpha > Services > OAuth2 Provider > Advanced OpenID Connect.
-
Enable Always Return Claims in ID Tokens.
-
Save your changes.
Demonstrate authentication requirements
Demonstrate the process with an RP that uses the Implicit grant:
-
Create an end user profile and record the username and password.
-
Optionally configure
amr
claims. -
Configure
acr
claims to map your duplicate journey to theusername-password
claim.
Create an RP profile
Register a custom OIDC application with the following settings:
Setting | Value |
---|---|
Application Type |
Web |
Name |
|
Sign On > General Settings > Sign-in URLs |
|
Sign On > General Settings > Grant Types |
Add |
Sign On > General Settings > Scopes |
|
Request voluntary claims
-
Open a new tab in your browser.
-
Paste a URL with the
acr_values
parameter to request voluntary claims into the new browser tab.The following URL requests an ID token with the implicit grant:
https://<tenant-env-fqdn>/am/oauth2/realms/root/realms/alpha/authorize?acr_values=username-password&client_id=myClient&response_type=id_token&scope=openid%20profile&redirect_uri=https://www.example.com:443/callback&nonce=abc123&state=123abc
-
Authenticate as the end user.
PingOne Advanced Identity Cloud redirects to the application sign-in URL (
redirect_uri
) with theid_token
in the fragment. -
Extract the ID token from the sign-in URL.
-
Decode the ID token to display the
acr
claim:{ "...": "...", "acr": "username-password" }
The
amr
claim is also displayed in the decoded token if you configuredamr
claims, for example:"amr": [ "otp" ],
Request essential claims
-
Define and URL-encode the essential claims parameter value.
Essential claims requesting
username-password
:{"id_token":{"acr":{"essential":true,"values":["username-password"]}}}
URL-encoded value:
%7B%22id_token%22%3A%7B%22acr%22%3A%7B%22essential%22%3Atrue%2C%22values%22%3A%5B%22username-password%22%5D%7D%7D%7D
-
Paste a URL with the encoded
claims
parameter to request essential claims into the new browser tab.The following URL requests an ID token with the implicit grant:
https://<tenant-env-fqdn>/am/oauth2/realms/root/realms/alpha/authorize?claims=%7B%22id_token%22%3A%7B%22acr%22%3A%7B%22essential%22%3Atrue%2C%22values%22%3A%5B%22username-password%22%5D%7D%7D%7D&client_id=myClient&response_type=id_token&scope=openid%20profile&redirect_uri=https://www.example.com:443/callback&nonce=abc123&state=123abc&prompt=login
The
prompt
setting forces the end user to authenticate explicitly regardless of any implied consent.When you request essential claims, PingOne Advanced Identity Cloud authenticates the end user again. Learn more in Request processing.
PingOne Advanced Identity Cloud redirects to the application sign-in URL (
redirect_uri
) with theid_token
in the fragment. -
Extract the ID token from the sign-in URL.
-
Decode the ID token to display the
acr
claim:{ "...": "...", "acr": "username-password" }