PingFederate provides a command-line interface (CLI) to help manage automated outbound provisioning at identity provider (IdP) sites.
Administrators can use the CLI to view the status of user provisioning, either globally or one provisioning channel at a time, and to rectify unusual situations where provisioning at the service provider (SP) might be out of sync with the enterprise user store.
The CLI tool, provmgr.bat or provmgr.sh, is located in the directory <pf_install>/pingfederate/bin. The tool interacts with the PingFederate internal datastore to maintain provisioning synchronization between the LDAP user store and the target service.
The tool creates its own log file, located at <pf_install>/pingfederate/log/provmgr.log. You can control settings for this log, as needed, in the <pf_install>/pingfederate/bin/provmgr.log4j2.xml file.
The following table describes the available global and channel-specific command arguments.
Command argument | Description |
---|---|
Global options | |
--help | Describes the available options. The help also displays if you run the command with no arguments. |
--show-channels | Lists all channels in a table format, showing for each:
|
--show-nodes | Shows all the provisioning-server nodes with their status and the last timestamp. Applicable only when failover provisioning is configured in the <pf_install>/pingfederate/bin/run.properties file. |
--force-node-backup Use with node number: -n <node ID> |
Sets the provisioner mode to FAILOVER for the associated PingFederate server node. |
Channel-specific options
Note:
With each command, specify the channel with the
You can determine channel ID numbers by using the global command
|
|
--reset-group-timestamp | Deletes the user-group timestamp, which forces the provisioner to process
the provisioning group on the next cycle, even if the timestamp on that group
did not actually change. Depending on your LDAP server and administrative
practices, you might want to schedule this command to run periodically to
catch up with any users that may have been deleted, rather than deactivated,
in the directory server. Some directory servers do not update the group
timestamp for deleted users.
Important:
You should rarely need this option if users are deactivated rather than deleted. If you do need it, you might want to schedule it when other network activity is low. |
--reset-attribute-sync | Sets the attribute sync timestamp to 1, which forces the provisioner to
look at all users for changes, not only those that have a newer timestamp on
their LDAP entry. Important:
This is rarely needed and might consume considerable network resources, depending on the number of users. If it is needed, you might want to schedule it when other network activity is low. |
--reset-values-hash | Removes the values hash for all users. The database stores a hash of
attribute values for users to determine whether any values have been changed.
This argument forces users that have a newer timestamp on their LDAP entry to be updated at the service provider, regardless of the actual field values. However, users whose recorded timestamp is unchanged are not updated. |
--reset-all | Equivalent to using all three of the previous arguments. |
--show-dirty-records | Lists all users or groups that have not been provisioned or updated at the SP site. This option is rarely needed and might consume considerable network resources, depending on the number of users. If it is needed, you might want to schedule it when other network activity is low. |
--show-dirty-group-records | List groups that have not been provisioned or updated at the SP site. |
--show-dirty-user-records | List all users that have not been provisioned or updated at the SP site. |
--show-group --show-user Use with: -u <provider name> Or: -g <LDAP GUID> |
Shows all internal database fields related to the specified user or group,
including transitory mapping fields, which are fields waiting to be pushed to
the SP. For a user, shows all LDAP attributes retrieved from the directory
server. Note:
You can obtain user or group names and GUIDs for dirty records, as
needed, using any of the The LDAP GUID, if used and if it is binary, should be entered in hexadecimal format, as shown in log files.
|
--clear-dirty-records | Clears the dirty flag on all records. |
--clear-dirty-group-records | Clears the dirty flag on all group records. |
--clear-dirty-user-records | Clears the dirty flag on all user records. |
--delete-dirty-records | Removes all dirty records from the internal store. |
--delete-dirty-group-records | Removes all dirty group records from the internal store. |
--delete-dirty-user-records | Removes all dirty user records from the internal store. |
--delete-all --delete-all-users |
The delete-all parameter removes all users and groups
from the internal store and deletes the provisioning group timestamp and the
last attribute-sync timestamp. The delete-all-users parameter deletes users and timestamps but retains groups. The effect
of either command is to reset the channel to its initial state for user
provisioning. All user metadata is lost and provisioning for the channel
will start from the beginning, picking up all users, and groups if deleted,
and pushing them to the SP when the synchronization frequency interval has
expired. The synchronization frequency interval is defined on
.Important:
You should rarely need these options. If needed, you might want to schedule the operation when other network activity is low. |
--show-target | Displays the target configuration. |
--show-source | Displays all source LDAP configuration parameters, including settings and location. |