Access token validators verify the tokens that HTTP client applications submit when they request access to protected resources and associate each token with an identity stored in the directory server.
To authenticate to PingDirectory Server's HTTP services, clients use OAuth 2 bearer token authentication to present an access token in the HTTP Authorization request header. To process the incoming access tokens, PingDirectory Server uses access token validators, which determine whether to accept an access token and translate it into a set of properties, called claims, which PingDirectory Server's HTTP services use to make access control decisions.
Most access tokens identify a user as its subject using the sub claim. Access token validators can retrieve the token subject's attributes from the directory using an identity mapper, which correlates the access token subject to an LDAP entry.
- Directory REST API
- SCIM 2
- Delegated Admin
- Consent API
In addition, PingDirectory Server can be configured to accept access tokens provided by LDAP clients using the OAUTHBEARER SASL authentication method.