Managing domain connectivity settings - PingFederate - 11.1

PingFederate Server

bundle
pingfederate-111
ft:publication_title
PingFederate Server
Product_Version_ce
PingFederate 11.1
category
Administrator
Audience
Capability
DeploymentMethod
Product
SingleSignonSSO
Software
SystemAdministrator
pf-111
pingfederate
ContentType_ce

You can change the default security and logging settings for all configured Active Directory domains and Kerberos realms.

On the Manage Domain/Realm Settings tab, change the default transport protocol, the debug option, the timeout value, and the number of retry attempts. For more information, refer to the following table.
Field Description
Force TCP When selected, requires use of the Transmission Control Protocol instead of the default User Datagram Protocol. Use this option when firewall or network configurations require acknowledgment that packets are properly received.
Note:

If you choose this option, you must restart PingFederate after saving the configuration.

Debug Log Output When selected, sends verbose messages to the PingFederate server log for all interactions with the domain controllers or the Key Distribution Centers (KDCs).
AD Domain Controller/Key Distribution Center Timeout (secs) The number of seconds that PingFederate waits for a network response from a domain controller or KDC. The default is 3.
Note:

This value applies to each attempt PingFederate makes to contact the domain controller or KDC.

The new timeout takes effect only after you save the configuration and restart PingFederate..

AD Domain Controller/Key Distribution Center Retries Specifies the number of times PingFederate tries contacting the domain controller or KDC. The default is 3.
Key Set Retention Period (mins) The number of minutes that PingFederate retains the encryption keys associated with the previous password of the Kerberos service account. The allowed range is 0 to 10080 minutes (seven days) and the default value is 610 minutes.

PingFederate only retains the key sets associated with previous passwords if you select the Retain Previous Keys on Password Change check box on the Manage Domain/Realm window. For more information, see Adding Active Directory domains and Kerberos realms.