Configure Microsoft Azure AD to mint access tokens that can be validated locally when PingAccess is protecting an API application.
Make sure that you've configured an application in Microsoft Azure AD. If you haven't, see creating Azure AD Graph API applications.
If you're using PingAccess to
protect an API application and want to use Azure AD as the common token provider,
you must complete this task. Because Microsoft Azure AD doesn't have an
introspection
endpoint to validate access tokens remotely, you
must use a key from the JSON Web Key Set (JWKS) endpoint to validate access tokens
locally. This task prevents Azure AD from adding a nonce value to the access token
after it's been signed because adding the nonce value blocks PingAccess's ability to validate
the access token.
However, if you're protecting a web application with PingAccess and
want to configure Azure AD as the common token provider, see configuring token provider-specific options
instead. You don't need to complete this task when PingAccess is
protecting a web application because the userinfo
endpoint in Azure
AD can use the nonce value that Azure AD inserts into the access token and validate
the access token remotely.
To configure Azure AD to mint an access token that can be validated locally:
You now have an access token that PingAccess can validate and have finished configuring your PingAccess application, web session, and access token validator to use Azure AD as the common token provider.