PingFederate can optionally store customer identities in PingDirectory. After you have installed PingDirectory, update the LDAP schema with a new object class and a couple attributes to store customer identities and their connections.
Update the LDAP schema with a new object class and a couple attributes using an LDIF file provided. To optimize performance, apply updates in indexes to the directory as well. In addition, you must configure in PingFederate an LDAP datastore connection to your PingDirectory and an LDAP Username password credential validator (PCV) instance for the HTML Form Adapter to validate user credentials. If you have previously created these components, you can reuse them.
Skip this configuration if your use case does not involve registration or profile management. For more information, see Enabling third-party identity providers without registration.
Update the LDAP schema.
- Sign on to the PingDirectory administrative console.
- Go to the screen.
- Click Import Schema Element.
Copy the schema changes from the
file and paste them into the text area.
If you are creating a new organizational unit as part of the LDIF import, edit the DN information.
- Click Import.
Create an equality index for the pf-connected-identity
Use PingDirectory's dsconfig utility to create this index. The dsconfig utility is interactive. You can also provide inputs as command arguments. For example, the following samples create the pf-connected-identity index.
$ bin/dsconfig create-local-db-index \ --backend-name userRoot \ --index-name pf-connected-identity \ --set index-type:equality
After adding the index, use the rebuild-index utility to build the indexes. For instance, the following sample builds the required index.
$ bin/rebuild-index \ --baseDN "dc=example,dc=com" \ --index pf-connected-identity
Create an LDAP datastore connection to your PingDirectory on .
If you have already created an LDAP datastore connection to your PingDirectory, you can reuse it.
Create an instance of the LDAP Username PCV on PingDirectory.
to validate user credentials stored in
If you have already created an LDAP Username PCV instance, you can reuse it.Note:
Later you will create a local identity profile as part of the customer IAM configuration. The Search Base value here should match the Base DN value defined in the local identity profile. For more information, see Configuring LDAP base DN and attributes.
For the local identity profile management page to work correctly, enable PingDirectory's
Use PingDirectory's dsconfig utility and a command like the following to enable the
ds-pwp-state-jsonvirtual attribute for users with the object class
dsconfig set-virtual-attribute-prop \ --name "Password Policy State JSON" \ --set enabled:true \ --set require-explicit-request-by-name:true \ --set "filter:(objectClass=person)"