Configuring admin UI SSO authentication - PingAccess - 8.0

PingAccess

bundle
pingaccess-80
ft:publication_title
PingAccess
Product_Version_ce
PingAccess 8.0 (Latest)
category
Product
pa-80
pingaccess
ContentType_ce

If you're using PingFederate as the token provider, complete the configuration for connecting to the PingFederate OAuth authorization server (AS)OAuth authorization server (AS)OAuth AS The authorizing service in an OAuth framework that issues and manages access tokens for clients to access protected resources. on the Configuring PingFederate for PingAccess SSO page.

You can configure roles for PingAccess administrative console users. Each role grants access to specific features:

The Administrator role
Has full access to the UI unless the Platform Administrator role is enabled. If the Platform Administrator role is enabled, the Administrator can't update authorization, user, or environment settings, but can use all other features.
The Platform Administrator role
Has full access to all features. This role can be used with the Administrator role to grant full access to most features without the possibility of accidental lockout with only the Platform Administrator able to change authorization configurations.
The Auditor role
Can view the user interface but can't change the configuration.

To configure admin UI SSO:

  1. Click Settings and then go to Admin Authentication > UI Authentication.
  2. On the Authentication Method page, click Single Sign-On.
    Tip:

    To define a fallback administrator authentication method if the OIDC token provider is unreachable, enable the admin.auth=native property in the run.properties file. This overrides any configured administrative authentication to basic authentication.

  3. In the OpenID Connect Login Type list, select a sign-on type.
    • Code (default): The standard OIDC sign-on flow.
    • POST: A sign-on flow using the form_post response mode, which returns response parameters as application/x-www-form-urlencoded HTML form values.
    • x_post: A sign-on flow based on OIDC that passes claims from the provider through the browser using the implicit grant type.
  4. In the Client ID field, enter the unique identifier assigned when you created the PingAccess OAuth client within your OIDC token provider.
  5. If you chose the Code sign-on type or want to enable session validation, select a Client Credentials Type from the following list, then provide the required information for the credential type that you chose.
    • Click Secret to use a client secret. In the Client Secret field, enter the client secret assigned when you created the OAuth relying party client in the token provider.
    • Click Mutual TLS to use Mutual TLS client authentication. In the Key Pair list, select a configured key pair to use for Mutual TLS client authentication.
    • Click Private Key JWT to use Private Key JSON Web Token (JWT)JSON Web Token (JWT)JWT An IETF standard container format for a JSON object used for the secure exchange of content, such as identity or entitlement information. To read the industry standard, see RFC 7519. No additional information is needed.
    Info:

    The OAuth clientOAuth clientThe application in an OAuth framework that requests access to resources. If the request is approved by the authorization server, the client is issued an access token for the resources. you use with PingAccess web sessions must have an OIDC policy specified. For more information, see Configuring OpenID Connect Policies.

  6. If you want to include authentication requirements for your environment, then in the Authentication Requirements list, select a defined authentication requirements list or click Create to create a new list.
  7. Optional: In the Username Attribute Name field, enter the attribute from the ID token to be used as the display name in the user interface and included in the audit logs.

    If the attribute isn't specified or can't be found, the sub attribute is used.

  8. Optional: If you want to enable advanced settings, click Show Advanced and use one or more of the advanced options.
    Advanced settings
    Advanced settings
    Advanced Option Description

    Scopes

    Configure your token provider to handle all of the requested scopes that you specify, including any custom scope values.

    • To request one or more scopes from the OIDC token provider, in the Scopes list, select one or more scopes.
      Note:

      If you configured a token provider, published scopes are available to select in the list based on the selected client ID.

    • To specify unverified scopes, enter the scope and click Use unverified scope "[scopename]".
    Important:

    The user can access all attributes by examining browser traces. Although the attributes are integrity-protected to prevent changes, users can view any of your sensitive or confidential attributes if they can decode the ID token's value.

    Validate Session

    To validate sessions with the configured PingFederate instance during request processing, click Yes.

    Note:

    This option is not supported by PingOne or third-party OIDC token providers.

    Refresh User Attributes

    To periodically refresh user data from the OIDC token provider:

    1. Click Yes.
    2. Specify a Refresh User Attributes Interval in seconds.

    Cache User Attributes

    To have PingAccess cache user attribute information for use in policy decisions, select the Cache User Attributes check box.

    Note:

    When this option is disabled, user attribute information is encoded and stored in the session cookie.

    Enable PKCE

    To have PingAccess send a SHA256 code challenge and corresponding code verifier as a Proof Key for Code Exchange during the code authentication flow, select the Enable PKCE check box.

    Note:

    The OpenID Connect Login Type must be set to Code for PingAccess to use PKCE.

    Use Single-Logout

    To enable the use of single logout (SLO)single logout (SLO)SLO The process of signing a user out of multiple sites where the user has started a single sign-on (SSO) session., select the Use Single-Logout check box.

    Important:

    You must configure this option in the OIDC provider.

    Tip:

    If you're using PingFederate as a token provider, enable the Check For Valid Authentication Session in the PingFederate access token management configuration to prevent session replay.

    Include id_token_hint in SLO

    Select the Include id_token_hint in SLO check box to include the id_token_hint parameter in the SLO request that PingAccess makes to the token provider. Use Single-Logout must be selected too.

    The id_token_hint parameter contains the PingAccess session cookie’s id_token, which token providers can use to locate a user’s session. Some token providers might require this parameter, but not all.

    Important:

    If this option is enabled, PingAccess tracks the id_token attribute. Tracking the id_token attribute increases the PingAccess cookie's size. This could make the cookie exceed the browser's limit. For more information, see Minimizing the PingAccess cookie size.

    PingAccess can also track the id_token attribute if the Track id_token check box is enabled, but this isn't a prerequisite step to enabling Include id_token_hint in SLO. For more information on this configuration, see step 7c of Configuring OpenID Connect token providers.
  9. Optional: To enable role-based authorization:
    1. Click the Roles tab.
    2. To enable role-based authentication, select the Enable Roles check box.
    3. In the Administrator section, click Add Required Attribute for each attribute that you want to add.

      For a role to be granted, all configured attribute values must match.

    4. Select an Attribute Name, and Attribute Value for each required attribute.
      Note:

      If you're using PingFederate as a token provider, the attribute name is defined in PingFederate under OAuth Settings > OpenID Connect Policy Management > <Your_Policy> > Attribute Contact as an extension to the contract.

      The value that you use depends on the configuration of the Contract Fulfillment tab for the policy. Copy-paste your attribute value to ensure accuracy.

      For example, the attribute named Group in your attribute contract can be mapped to an LDAPLDAP (Lightweight Directory Access Protocol) An open, cross platform protocol used for interacting with directory services. server attribute source that contains a groupMembership attribute. A valid group membership for the administrator might be the group cn=pingaccess-admins,o=myorg.

      In this example, you should use Group as the Attribute Name and cn=pingaccess-admins,o=myorg as the Attribute Value.

    5. In the Matching Strategy list, select the context that you want PingAccess to evaluate requests with when looking for a match.
      Case-Sensitive
      To register as a match, the attribute value in the request must be written in the same case as the attribute value that you specify in step 7. By default, PingAccess uses this matching strategy.
      Case-Insensitive
      Case doesn't matter when looking for a match. Select this option for more flexibility if you might make changes to the attribute source that don't alter it semantically.
      DN Matching
      Normalizes both the attribute value that you specify in step 7 and any attribute value that PingAccess gathers at runtime from the user identity attributes as an X.500 distinguished name (DN)distinguished name (DN)DN A name uniquely identifying an object within the hierarchy of a directory tree.. PingAccess then looks for a match between the distinguished names.
      Tip:
      • If you select DN matching, make sure to select an Attribute Name in step 5 that can contain a DN. The administrative console doesn't provide a warning if you select an invalid attribute type, but you can check your log files to confirm that you don't have any DN-related errors.
      • PingAccess validates the Attribute Value that you specify in step 7 to make sure that it's a valid X.500 DN that follows RFC-1779 or RFC-2253. Copy-paste the attribute value to ensure accuracy.
      • Relative DNs that have non-printable or non-UTF-8 string values, such as email and domain component (DC) relative DNs, are case-sensitive. Otherwise, relative DN values are case-insensitive.
    6. Optional: To add platform administrators:
      1. Select the Enable Platform Administrator Role check box.
      2. Select an Attribute Name, Matching Strategy, and Attribute Value for each required attribute.
      3. To add a new attribute, click Add Required Attribute.
    7. Optional: To add auditors:
      1. Select the Enable Auditor Role check box.
      2. Select an Attribute Name, Matching Strategy, and Attribute Value for each required attribute.
      3. To add a new attribute, click Add Required Attribute.
  10. Click Save.

For more information about what to do if you misconfigure admin UI SSO and get locked out, see Administrative SSO lockout.