Create a new OAuth or OpenID Connect (OIDC) application in PingFederate.
Component
- PingFederate 10.1
Do the following:
- In the PingFederate administrative console, go to Applications > OAuth > Clients, and click Add Client.
-
In the Client ID field, provide a client ID.
The client ID is a unique identifier and cannot have the same ID as another OAuth client.
Note:You cannot change a client ID after it is set.
-
In the Name field, enter a name for the client.
The name value is a descriptive name displayed for end users that indicates the purpose of the client.
- In the Description field, provide a description that gives additional detail on the use of the client.
-
Select a Client Authentication method:
- None
- Client TLS Certificate
- In the Issuer list, select the certificate for a trusted issuer if the client should expect certificates from a specific issuer. If certificates from any issuer should be allowed, select Trust Any.
- In the Subject DN field, enter the subject DN for the certificate or extract it from a file by clicking Choose File, selecting an appropriate certificate, and then clicking Extract.
- Private Key JWT
- Select the Replay Prevention check box if the client should require a unique JSON web token (JWT) for each request.
- From the Signing Algorithm list, select the specific algorithm for the incoming JWT, or to allow any supported signing algorithm to be used, select Allow Any.
- Client SecretNote:
If selected as the authentication method, you must provide a client secret. If you select another method for authentication, you don't need a client secret.
- Select the Change Secret check box.
- In the Client Secret field, enter a client secret, or to have a random value provided, click Generate secret. Make a copy of this value because it won't be visible after the client is saved.
- If the client requires all requests to be signed, select the Require Signed Requests check box.
- If you selected Require Signed Requests check box, select the expected signing algorithm or select Allow Any.
-
If you selected Private Key JWT as the authentication
method, or if you selected the Require Signed Requests
check box, complete either the JWKS URL or
JWKS fields:
- To use a JSON web key set (JWKS) URL, enter the URL of the JWKS.
- To provide the JWKS directly, copy and paste the contents of the JWKS in the JWKS field.
-
If the client will be configured to support the OAuth authorization code or
implicit flows, in the Redirection URI section, enter at
least one URI.
The redirection URI values specify the valid redirection locations that an application might request post authorization. The redirection URI value must be a fully qualified URL. Wildcards can be used to allow redirection into any sub-path. Make redirection URIs as restrictive as possible.
- In the Redirection URI field, enter a value.
- Click Add.
- Repeat steps 9a and 9b for each valid redirection URI.
-
In the Logo URL field, enter a
fully qualified URL.
This is the URL for the logo image that displays on the User Grant Authorization and Revocation pages.
-
If the client will use the PingFederate authentication API
for authentication and will require an experience that doesn't use HTTP
redirections, select the Allow Authentication API OAuth
Initiation check box.
Note:
- The Bypass Authorization Approval check box is automatically selected and can't be changed because this flow doesn't support the user-facing grant consent page.
- The Restrict Common Scopes check box is automatically selected and can't be changed because this flow doesn't support the user-facing grant consent page.
- Any configured Common Scopes and the default openID scope is displayed and can be selected as valid scopes for the client.
-
If any exclusive scopes are defined and the client should
be allowed to use them, select the Exclusive Scopes check
box.
Any defined exclusive scopes are displayed and can be selected as available to this client.
-
In the Allowed Grant Types list, select at least one
option.
For more information on each grant type, see Grant Types.
-
If the client should restrict the available response
types requested by the application, select the Restrict Response
Types check box.
- In the list of available response types, select at least one option.
-
In the Default Access Token
Manager list, select the default access token manager (ATM) for
this client.
The Default ATM can either be the default ATM configured in Access Token Mappings or a specific ATM.
- Optional: For resource server clients that won't receive a specific request for an ATM, select the Validate Against All Eligible Access Token Managers check box to instruct PingFederate to validate access tokens against all available ATMs.
-
If the client should require PKCE, select the
Require Proof Key for Code Exchange (PKCE) check
box.
Note:
This check box isn't displayed unless Authorization Code is selected under Allowed Grant Types.
-
Override the global setting for the Persistent
Grants Max Lifetime set in System > OAuth Settings > Authorization Server Settings:
- To use the global setting (default), click Use Global Setting.
- For grants that should not have an expiration, click Grants Do Not Expire .
- To enter a custom duration for this client’s grants, click the radio button below Grants Do Not Expire.
-
Override the global setting for the Refresh
Token Rolling Policy set in System > OAuth Settings > Authorization Server Settings.
The client can override the global setting.
- To use the global setting (default), click Use Global Setting.
- To tell the client to never roll the refresh token, click Don't Roll.
- To tell the client to roll the refresh token, click Roll.
- Change the default option for the token signing algorithm by selecting a different value in the ID Token Signing Algorithm list.
- If the content of the ID token should be encrypted, then in the ID Token Key Management Encryption Algorithm list, select the algorithm that will be used to encrypt the content encryption key.
- Optional: If an ID Token Key Management Encryption Algorithm is selected, then in the ID Token Content Encryption Algorithm list, select the value of the encryption algorithm used to encrypt the plaintext content of the ID token.
-
To have the client use a specific OIDC policy, in the
Policy list, select a specific value.
By default, the client uses the OIDC policy configured as default in Applications > OAuth > OpenID Connect Policy Management.
-
To enable pairwise pseudonymous identifiers for open
banking support, select the Use Pairwise Identifier check
box.
- In the Sector Identifier URI field, enter a single HTTPS URI.
-
To send logout requests to an OIDC endpoint in PingAccess as part of the logout process, select
the PingAccess Logout
Capable check box.
Note:
This check box only displays if the Track User Sessions for Logout option is selected in System > OAuth Settings > Authorization Server Settings.
-
Enter a fully qualified URI in the Logout
URIs field and click Add for each
endpoint desired.
Note:
The Logout URIs field is displayed only if the Track User Sessions for Logout option is selected in System > OAuth Settings > Authorization Server Settings.
PingFederate sends logout requests to each relying party listed.
- To allow the client to use the back-channel session revocation API, select the Allow Access to Session Revocation API check box.
- To allow the client to use the session management API, select the Allow Access to Session Management API check box.
-
Override the global values set by clicking
Override in System > OAuth Settings > Authorization Server Settings.
Note:
The Device Authorization Grant settings section is only displayed If Device Authorization Grant is selected in Allowed Grant Types.
- To allow the client to override the global value for the user authorization URL, in the User Authorization URL field, enter a fully qualified URL.
- To allow the client to override the global value for an activation code, in the Pending Authorization Timeout (seconds) field, specify a timeout value.
- To allow the client to override the global value for the device's polling interval to the PingFederate token endpoint, in the Device Polling Interval (seconds) field, enter an interval value.
- To allow the client to override the global setting for bypassing the confirmation of an activation code, select the Bypass Activation Code Confirmation check box.
-
Configure the following CIBA settings:
Note:
The CIBA section is displayed only if CIBA is selected in Allowed Grant Types.
-
In the Token Delivery Method field, specify
token delivery method for the client:
- If the client can check authorization results at the token endpoint, select Poll.
- If the client expects a callback when authorization results are available, select Ping.
- If you selected Ping, in the Notification Endpoint field that displays, enter the client notification endpoint for PingFederate to provide call back messages for this client.
-
If you selected Poll, to override the default
polling interval, in the Polling Interval field,
specify a value..
The default polling interval for Poll clients is 3 seconds.
- To override the default CIBA request policy configured in Applications > OAuth > CIBA > Request Policies, in the Policy list, select a different request policy.
- To enable support for the user code in the client, select the User Code Support check box.
- To require CIBA signed requests, select the Require CIBA Signed Requests check box.
-
To select a specific algorithm, in the CIBA Request Object
Signing Algorithm list, select a specific value .
By default, the client supports any signing algorithm for the CIBA request object.
-
In the Token Delivery Method field, specify
token delivery method for the client:
-
To override the default processor policy configured in Applications > Processor Policies, in the Processor Policy list, select a
specific process policy.
If Token Exchange is selected in Allowed Grant Types, the Token Exchange section is displayed.
- If any extended properties are defined in System > Extended Properties, click Next to continue to the Extended Properties options for the client.
- Click Save.