Configuring the token provider - PingAccess - 7.2

PingAccess

bundle
pingaccess-72
ft:publication_title
PingAccess
Product_Version_ce
PingAccess 7.2
category
Product
pa-72
pingaccess
ContentType_ce

Establish communication with the token provider, PingFederate.

For more information, see Manage Token Provider.

  1. Click Settings and then go to System > Token Provider > PingFederate > Runtime.
  2. In the Issuer field, enter the PingFederate issuer URI.
  3. From the Trusted Certificate Group list, select the PingFed certificate group.
  4. Click Save.
  5. Click Settings and then go to System > Token Provider > PingFederate > Administration.
  6. In the Host field, enter the host name or IPIP (Internet Protocol) The method by which data is sent across the Internet from the source host to the destination host. address for the PingFederate Admin.

    For example, mypingfedserver.

  7. In the Port field, enter the port number for the PingFederate Admin.

    For example, 9999.

  8. In the Admin Username field, enter the username.

    This username only requires auditor (read only) permissions in PingFederate.

  9. In the Admin Password field, enter the password.
  10. From the Secure list, select Secure.
  11. From the Trusted Certificate Group list, select the PingFed certificate group.
  12. Click Save.
  13. Click Settings and then go to System > Token Provider > PingFederate > OAuth Resource Server.
  14. In the Client ID field, enter the OAuth Client ID you defined when creating the PingAccess OAuth clientOAuth clientThe application in an OAuth framework that requests access to resources. If the request is approved by the authorization server, the client is issued an access token for the resources. in PingFederate.

    For example, pa_rs.

  15. In the Client Credentials Type section, select Secret, then enter the Client Secret assigned when you created the PingAccess OAuth client in PingFederate.
  16. In the Subject Attribute Name field, enter the attribute you want to use from the OAuth access tokenaccess token A data object by which a client authenticates to a resource server and lays claim to authorizations for accessing particular resources. as the subject for auditing purposes.

    For example, username.

  17. Click Save.
You can configure PingAccess to Protect a web application.