Configure required parameters in PingFederate's oidc.properties and run.properties files.
-
Configure the required parameters in the
<pf_install>/pingfederate/bin/oidc.properties
file.
You’ll need the client ID and secret from the client you created, and you should obfuscate the secret. You’ll also need the
iss
attribute value you used in the access token manager mappings.Use the authorization and token endpoints with your PingFederate base URL.
An example configuration is shown here:
client.id=pfadminconsole client.authn.method=client_secret_basic client.secret=********* authorization.endpoint=https\://pingfed-idp.ad.jibboo.org\:9031/as/authorization.oauth2 token.endpoint=https\://pingfed-idp.ad.jibboo.org\:9031/as/token.oauth2 issuer=jibbooidp scopes=openid username.attribute.name=sub role.attribute.name=admin_role role.admin=admin role.cryptoManager=cryptoadmin role.userAdmin=useradmin role.expressionAdmin=expressionadmin
-
Configure the pf.console.authentication parameter in the
<pf_install>/pingfederate/bin/run.properties
file as follows:
pf.console.authentication=oidc
- Restart your PingFederate server.