Download the LDAPS certificate from PingDirectory Server. For more information, see Exporting certificates.
  1. Sign on to the PingFederate administrative console.
  2. Import the PingDirectory Server LDAPS certificate.
    1. Go to SECURITY > Certificate & Key Management > Trusted CAs.
    2. Click Import, click Choose File to browse to the certificate, click Next, and then click Save.
  3. Add an LDAP datastore.
    1. Go to SYSTEM > Data Stores.
    2. Click Add New Data Store.
    3. Specify a NAME for the data store.
    4. Set TYPE to Directory (LDAP).
    5. Click Next.
    6. In the Hostname(s) field, enter the PingDirectory Server host name and LDAPS port, separated by a colon (for example, 10.101.113.75:1389) and click Add.
    7. Select the USE LDAPS check box.
    8. Set LDAP TYPE to PingDirectory.
    9. In the USER DN field, enter one of the following values based on your PingDirectory configuration.
      • cn=dmanager
      • cn=Directory Manager
    10. In the PASSWORD field, specify the root password.
    11. Click Advanced and then Advanced LDAP Options.
      1. Select the CREATE NEW CONNECTIONS IF NECESSARY check box.
      2. Clear the VERIFY LDAPS HOSTNAME check box.
      3. Click Done.
    12. Click Test Connection.
    13. Click Next.
    14. Click Save.
  4. Create the HTML form IdP Adapter.
    The adapter authenticates users against PingDirectory Server.
    1. Go to AUTHENTICATION > IdP Adapters > Create New Instance
    2. In the INSTANCE NAME field, enter a name such as PingDirectoryIdP.
    3. Specify an INSTANCE ID.
    4. Set TYPE to HTML Form IdP Adapter.
    5. Click Next.
    6. Go to the bottom of the page and click Manage Password Credential Validators.

      Create a validator to authenticate users against PingDirectory Server.

      1. Click Create New Instance.
      2. Specify an INSTANCE NAME.
      3. Specify an INSTANCE ID.
      4. Set TYPE to LDAP User Name Password Credential Validator.
      5. Click Next.
      6. Specify an LDAP DATASTORE.
      7. Specify an SEARCH BASE.
      8. Enter the following text in the SEARCH FILTER field to use the email address or user name to sign on to the system.
        (|(uid=${username})(mail=${username}))
      9. Click Next and extend the contract with entryUUID and cn.

        These values are used later.

      10. Click Next, Done, or Save until you reach the Create Adapter Instance screen.
    7. Add a new row to Password Credential Validators, choose the new LDAP Password Credential Validator, and click Update.
    8. Go to the Extended Contract tab and extend the adapter contract with entryUUID and cn.
    9. Go to the Adapter Attributes tab, select entryUUID for a pseudonym, and then click Next, Next, Done, and Save.
  5. Enable session tracking.
    1. Go to AUTHENTICATION > Policies > Sessions
    2. Select the TRACK ADAPTER SESSIONS FOR LOGOUT check box.
    3. Select the TRACK REVOKED SESSIONS ON LOGOUT check box.
    4. Select the ENABLE AUTHENTICATION SESSIONS FOR ALL SOURCES check box.
    5. Click Save.