The PingOne LDAP Gateway reduces the complexity of moving to the cloud while maintaining connectivity to on-premise end-user data.
Make sure you have the following in place:
- A PingOne environment configured with an LDAP gateway. See Gateways and Adding a Gateway.
- A connection between PingFederate and PingOne. See Creating connections to PingOne.
When PingFederate is deployed off-premise, as a PingOne Advanced Service or in your own cloud deployment, you can configure the PingOne LDAP Gateway datastore to enable PingFederate to access an on-premise LDAP directory for HTML Form Adapter functionality, provisioning, customer identity access management (CIAM), and other areas.
Currently, you cannot use the PingOne LDAP Gateway for grant storage, persistent authentication sessions, and OAuth client records. All other LDAP datastore functionality works in the same way as the direct LDAP datastore.
- Go to .
- In the Data Stores window, click Add New Data Store.
- On the Data Store Type tab, enter a name for the datastore in the Name field.
- In the Type list, select PingOne LDAP Gateway.
- Optional: To mask attribute values returned from this datastore in PingFederate logs, select the Mask Values in Log check box.
- Click Next.
In the LDAP Gateway Configuration window, configure your
LDAP Gateway as follows.
- In the PingOne Environment list, select your PingOne environment.
- In the PingOne LDAP Gateway list, select your PingOne LDAP gateway.
Click Test Connection to determine whether the
administrative node can communicate with the specified datastore.
Datastore validation is no longer enabled during configuration. This feature lets you configure datastores without requiring a successful connection between the administrative node and the datastore. You can also save the datastore even if the connection is not currently successful.
- Click Advanced if you want to configure LDAP attributes to be handled as binary data.
- Click Next to view the summary of your LDAP gateway datastore configuration.
- Click Save.