For an Identity Provider (IdP), PingFederate includes a Composite Adapter that allows an administrator to chain the selection of available adapter instances for a connection. At runtime, adapter chaining means that SSO requests are passed sequentially through each adapter instance specified until one or more authentication results are found for the user.

Adapter chaining can be used to choose an adapter instance based on the method by which a user authenticated, or to integrate an organization's multi-factor authentication requirement.


For complex authentication requirements, consider implementing authentication policies. Go to Authentication > Policies. From the Policies window, make changes on the Policies tab.