1. Configure the required parameters in the <pf_install>/pingfederate/bin/oidc.properties file.

    You’ll need the client ID and secret from the client you created, and you should obfuscate the secret. You’ll also need the iss attribute value you used in the access token manager mappings.

    Use the authorization and token endpoints with your PingFederate base URL.

    An example configuration is shown here:

    client.id=pfadminconsole
    client.authn.method=client_secret_basic
    client.secret=*********
    authorization.endpoint=https\://pingfed-idp.ad.jibboo.org\:9031/as/authorization.oauth2
    token.endpoint=https\://pingfed-idp.ad.jibboo.org\:9031/as/token.oauth2
    issuer=jibbooidp
    scopes=openid
    username.attribute.name=sub
    role.attribute.name=admin_role
    role.admin=admin
    role.cryptoManager=cryptoadmin
    role.userAdmin=useradmin
    role.expressionAdmin=expressionadmin
    
  2. Configure the pf.console.authentication parameter in the <pf_install>/pingfederate/bin/run.properties file as follows:
    pf.console.authentication=oidc
  3. Restart your PingFederate server.