Configuring PingID for primary authentication requires you to create a policy contract and a policy in PingFederate.
If you are running PingFederate 9.0 or earlier, you will need to create a composite adapter rather than a PingFederate policy. For more information, see Configuring a composite adapter.
- Install the PingID Integration Kit
- Generate and download the PingID properties file
- Configure a PingID adapter
instanceNote:
PingID can only be used for primary authentication when a persistent cookie for the PingID Adapter exists in the user’s browser.
- Create an IdP adapter for Primary authentication (for example, an HTML Form Adapter). For more information, see Configure an IdP adapter instance. This adapter is used if the persistent cookie for the PingID Adapter does not appear in the user’s browser. It enables PingID to acquire the proper user information and mobile device fingerprint. The user credentials are then stored in a persistent cookie in the user's browser, and all subsequent SSO operations pass these credentials to the PingID adapter.
- If you want to configure the application name or application icon, you can do so in PingFederate. For more information, see Identifying the target application.
The following endpoint can be used to clear the primary authentication:
https://HOSTNAME:PORT/ext/pingid-reset-primary-auth
.
When a user redirects to this endpoint, the PingID primary authentication cookie is cleared on the user’s browser and the user is redirected to the primary authentication IdP adapter sign-on page. The next sign-on attempt from that browser will require first factor authentication. This is useful for cases such as authentication context switch for multiple users sharing the same device.