Defining a request policy - PingFederate - 11.2

PingFederate Server

bundle
pingfederate-112
ft:publication_title
PingFederate Server
Product_Version_ce
PingFederate 11.2
category
Administrator
Administratorguide
Audience
Capability
ContentType
DeploymentMethod
Guide
Product
Productdocumentation
SingleSignonSSO
Software
SystemAdministrator
pf-112
pingfederate
ContentType_ce
Guide
Guide > Administrator Guide
Product documentation

You can define the basics of your client-initiated backchannel authentication (CIBA) request policy in the PingFederate administrative console.

  1. Go to Applications > OAuth > CIBA Request Policies.
  2. On the Manage Policy tab, define the basics of your CIBA request policy.

    For more information about each field, refer to the following table.

    Field Description
    Policy ID

    (Required)

    The unique identifier of this request policy.
    Name

    (Required)

    The name of this request policy.
    Authenticator

    (Required)

    The CIBA authenticator instance associated with this request policy.
    User Code PCV The Password Credential Validator (PCV) instance that PingFederate uses to validate the user_code parameter values it receives from clients associated with this request policy.
    Important:

    If a client is associated with a request policy that has been configured with a PCV instance, it can support user code in its configuration.

    A client supporting user code must not be associated with a request policy that is not configured with a PCV instance. For more information on CIBA client configuration, see Configuring OAuth clients.

    Transaction Lifetime (Seconds) The validity, in seconds, of authentication requests PingFederate receives from clients associated with this request policy since the generation of their authentication request acknowledgments.

    The default value is 120.

    Clients can request a shorter lifetime by including the requested_expiry request parameter in their authentication requests.

    Allow Unsigned Login Hint Token Controls whether clients associated with this request policy can use unsigned JSON web tokens (JWT) as values of the login_hint_token request parameter in their authentication requests.

    This check box is not selected by default.

    Require Token for Identity Hint Controls whether clients associated with this request policy must use either the id_token_hint or login_hint_token as the identity hint in their authentication requests.

    This check box is not selected by default.

    When selected, clients associated with this request policy cannot use login_hint as the identity hint in their authentication requests.

    Alternative Login Hint Token Issuers Alternative issuers that clients associated with this request policy can use in their signed login hint tokens. Furthermore, each additional issuer requires either the JWKS url or the actual JWKS so that PingFederate can verify the authenticity of the signed login hint tokens.
  3. Click Next.