This task is optional. You can use logging for troubleshooting or analytics.

For general information about logging, see Enabling debug messages and console logging in the PingFederate documentation.

  1. Open the <pf_install>/pingfederate/server/default/conf/log4j2.xml file for editing.
  2. To log activity for PingFederate and all adapters:
    1. Find the following section in the file.
      <AsyncRoot level="INFO" includeLocation="false">
      	<!-- <AppenderRef ref="CONSOLE" /> -->
      	<AppenderRef ref="FILE" />
      </AsyncRoot>
    2. Change INFO to DEBUG.

      The following code snippet shows DEBUG in bold for visibility.

      <AsyncRoot level="DEBUG" includeLocation="false">
      	<!-- <AppenderRef ref="CONSOLE" /> -->
      	<AppenderRef ref="FILE" />
      </AsyncRoot>
    3. Optional: To see the adapter activity in the console as well as the log file, remove the comment tags (<!-- and -->) that surround the CONSOLE line.
      <AsyncRoot level="INFO" includeLocation="false">
      	<AppenderRef ref="CONSOLE" />
      	<AppenderRef ref="FILE" />
      </AsyncRoot>
  3. If you want to log activity relating to the Azure AD Identity Protection IdP Adapter, do one of the following.
    Tip:

    You can use this information with a third-party log analysis tool to monitor for important events, such as when a sign-on event has a high-risk risk level.

    • To log activity for the Azure AD Identity Protection IdP Adapter as well as its HTTPS and component activity, add the following line.
      <Logger name="com.pingidentity.adapters.azure.ad.identity.protection" level="DEBUG"/>
    • To log activity for the adapter's HTTPS activity and other components but not the adapter itself, add the following line.
      <Logger name="com.pingidentity.adapters.azure.ad.identity.protection.shade" level="DEBUG"/>
    • To log activity for the Azure AD Identity Protection IdP Adapter but not its HTTPS or component activity, add the following lines.
      <Logger name="com.pingidentity.adapters.azure.ad.identity.protection" level="DEBUG"/>
      <Logger name="com.pingidentity.adapters.azure.ad.identity.protection.shade" level="INFO"/>
  4. Save the file.