Identifying inbound provisioning attributes for LDAP - PingFederate - 11.2

PingFederate Server

bundle
pingfederate-112
ft:publication_title
PingFederate Server
Product_Version_ce
PingFederate 11.2
category
Administrator
Administratorguide
Audience
Capability
ContentType
DeploymentMethod
Guide
Product
Productdocumentation
SingleSignonSSO
Software
SystemAdministrator
pf-112
pingfederate
ContentType_ce
Guide
Guide > Administrator Guide
Product documentation

When configuring System for Cross-domain Identity Management (SCIM) inbound provisioning, you must identity the attributes you want to provision.

You can select the datastore attributes you want to provision on the Attributes tab.

Note:

This tab appears only if you are configuring an LDAP user store for provisioning.

Screen capture of the Attributes tab.
The following attributes are managed internally by PingFederate and do not require mapping:
  • objectClass
  • unicodePwd
  • objectGUID
  • userAccountControl

You can override the internal management of objectClass and unicodePwd by selecting these attributes and mapping them to SCIM attributes on the Attribute Fulfillment tab. In this case, the values you supply are used. The objectGUID and userAccountControl attributes cannot be overridden and are ignored if selected.

  1. Select a root object class and an attribute from the lists, then click Add Attribute.
    Important:

    Do not add cn as one of the attributes.

    Screen capture of the Root Object Class and Attribute fields. Do not add CN as one of the attributes
  2. Repeat the previous step for each attribute requiring provisioning.