Creating an OpenID Connect IdP connection in PingFederate

Use Cases

bundle
solution-guides
ft:publication_title
Use Cases
Product_Version_ce
category
ContentType
howtodoc
ContentType_ce
How-to
  1. In PingFederate, go to Authentication > Integration > IdP Connections and click Create Connection.
  2. On the Connection Type tab, select Browser SSO.
  3. In the Protocol list, select OpenID Connect.
  4. Click Next.
  5. On the Connection Options tab, click Next.
  6. On the General Info tab, enter the following values:
    1. In the Issuer field, enter https://login.microsoftonline.com/common and click Load Metadata.
      When you click Load Metadata, the Issuer field is updated with a metadata URL.
    2. Replace the <tenant> placeholder at the end of the URL with your Microsoft Tenant ID and add /v2.0 to the end of the URL.
      Note:

      You can find your Tenant ID at Azure Active Directory > Overview in your Microsoft Azure account.

    3. Select the Enable Additional Issuers check box.
    4. In the Connection Name field, enter a plain-language identifier for the connection, for example a company or department name.

      This name is displayed in the connection list in the administration console.

    5. In the Client ID field, enter the Application (client) ID value found in the App registrations menu in Azure AD.
    6. Click Next.
  7. On the Additional issuers tab, select the Accept All issuers (Not Recommended) check box and click Save.
  8. On the Browser SSO tab, click Configure Browser SSO.
    1. On the User-Session Creation tab, click Configure User-Session Creation
    2. Choose one of the Identity Mapping tab options:
      • Click Account Mapping if you plan to pass end-user claims to the target application through a service provider (SP) adapter instance, or an authentication policy contract if your PingFederate server is a federation hub that bridges an OpenID provider to an SP.
      • Click Account Linking if your target application requires account linking.
      • Click No Mapping if you plan to pass end-user claims to the target application through an authentication policy contract in an SP authentication policy.
  9. Delete the attributes that are unnecessary to your application in the Attribute Contract menu generated by the issuer metadata in Step 5.
    You are likely to encounter attribute-related errors when testing your connection. If this occurs, review the server.log file to see what attributes or claims are sent to Azure and delete the unnecessary attributes from your attribute contract.
  10. Optional: On the Target Session Mapping menu, click Map New Adapter Instance to map end-user claims to the target application through an SP adapter instance or an authentication policy contract.

    For more information, see Managing target session mappings.

  11. On the Summary tab, review the User Session Creation settings and click Save.
  12. On the Protocol Settings tab, click Configure Protocol Settings.
  13. On the OpenID Provider Info tab, enter the following values.
    Field Value

    Authorization Endpoint

    https:://login.microsoftonline.com/common/oauth2/v2.0/authorize

    Token Endpoint

    https://login.microsoftonline.com/common/oauth2/v2.0/token

    User Info Endpoint

    https:://graph.microsoft.com/oidc/userinfo

    JWKS URL

    https:://login.microsoftonline.com/common/discovery/v2.0/keys

  14. When you have finished configuring the identity provider (IdP) connection, copy the Redirect URI from the Activation & Summary tab and add it to your V2 application.
    1. In your Azure account, go to App registrations.
    2. Click the application you want to connect.
    3. Click Authentication > Add a platform > Web.
    4. Paste the redirect URI into the Enter the redirect URI of the application field.
    5. Select both the Access Tokens and ID Tokens check boxes.
    6. Click Configure.
You can now authenticate users with non-Azure Microsoft accounts.