Creating an OpenID Connect policy - PingAccess - 7.3

PingAccess

bundle
pingaccess-73
ft:publication_title
PingAccess
Product_Version_ce
PingAccess 7.3
category
Product
pa-73
pingaccess
ContentType_ce

Configure an OpenID Connect (OIDC)OpenID Connect (OIDC)OIDC An authentication protocol built on top of OAuth that authenticates users and enables clients (relying parties) of all types to request and receive information about authenticated sessions and users. OIDC is extensible, allowing clients to use optional features such as encryption of identity data, discovery of OpenID Providers (OAuth authorization servers), and session management. policy to define OIDC policies for client access to attributes mapped according to OpenID specifications.

For more information, see Configure OpenID Connect policies.

  1. Go to Applications > OAuth > OpenID Connect Policy Management.
  2. Click Add Policy.
  3. In the Policy ID field, enter an Policy ID of your choosing.

    For example, OIDC.

  4. In the Name field, enter a name of your choosing.

    For example, OIDC.

  5. From the Access Token Manager list, select the access token you created in Configuring an access token mapping.

    For example, GeneralAccessToken.

  6. Click Next.
  7. On the Attribute Contract tab, delete all items beneath the Extend the Contract heading.
  8. Click Next until the Contract Fulfillment tab is displayed.
  9. From the Source list, select Access Token.
  10. From the Value list, select username.
  11. Click Next until the Summary tab is displayed. Click Save.
  12. In the Action column for the policy you created, if the policy is not already listed as the default, click Set as Default .
Create a resource server client.