Creating a password credential validator

Azure AD and Office 365 Integration Guide

  • Azure AD and Office 365 Integration Guide
  • Prerequisites
  • Getting ready to integrate Azure Active Directory
  • Preparing Active Directory for federation
  • Configuring a federated domain
  • Enabling federated authentication
  • Configuring multiple domains
  • Setup
  • Install and configure PingFederate
  • Configuring PingFederate to omit line breaks in digital signatures
  • Enabling server protocols
  • Replacing the default SSL certificates
  • Configuring an LDAP connection
  • Creating a password credential validator
  • Configuring an IdP adapter
  • Configuring a username token processor instance
  • Enable Kerberos authentication
  • Creating a connection to Azure Active Directory
  • Configuring browser SSO
  • Configuring assertion creation
  • Configuring attribute source and user lookup for HTML Form Adapter instances
  • Mapping an HTML form adapter instance
  • Configuring WS-Trust STS
  • Configuring attribute source and user lookup for token processors
  • Troubleshooting
  • Testing your configuration
  • Performance considerations
  • Troubleshooting
Page created: 24 May 2022 |
Page updated: 24 May 2022
| 1 min read

Microsoft Azure AD Other Documents Integrations Language English Integration Content Type Product documentation Audience Administrator

After configuring an LDAP connection, the next step is to create an LDAP password credential validator (PCV).

  • Complete the steps in Configuring the LDAP Username Password Credential Validator in the PingFederate documentation.
    Tip:

    If you need to support multiple Office 365 subdomain accounts using one SP connection in PingFederate 7.2 or later, create additional LDAP PCVs against your LDAP data store connections. For more information, see Configuring an LDAP connection.

Back to home page