Configuring a PingFederate authentication policy using PingID MFA authentication for CyberArk PVWA
For CyberArk and Ping Identity best practices, deploy MFA for all single sign-on (SSO) requests to the CyberArk Password Vault Web Access (PVWA).
About this task
Integrate a PingFederate authentication policy with PingID multi-factor authentication (MFA).
|
The following configuration steps assume you are creating a new authentication policy specifically for MFA to the CyberArk PVWA. If other existing authentication policies are in use, modify your policy tree to perform this task. |
Steps
-
Go to Authentication → Integration → IdP Adapters.
Result:
The Manage IdP Adapter Instances page opens.
-
Click Create New Instance.
-
On the Type tab, enter a Instance Name and anInstance ID
-
In the Type list, select the PingID Adapter 2.6 adapter type. Click Next.
-
On the IdP Adapter tab, select Choose File and upload the PingID properties file. Click Next.
-
On the Extended Contract tab, click Next.
-
On the Adapter Attributes tab, select the Pseudonym checkbox for the subject attribute. Click Next.
-
On the Adapter Contract Mapping tab, click Next.
-
On the Summary tab, click Done to return to the Manage IdP Adapter Instances page.
-
Click Save.
-
Create a new authentication policy.
These steps will help you create a new authentication policy. For general information about configuring authentication policies, see Defining authentication policies in the PingFederate documentation.
-
Go to Authentication → → Policies to open the Authentication Policies window.
-
On the Policies tab, select the IDP Authentication Policies checkbox. Click Add Policy.
Result:
A new Policy configuration page opens.
-
Enter an authentication policy name in the Name field and a description in the Description field.
-
In the Policy list, select HTMLForm - (Adapter).
-
In the Fail list, click Done.
-
In the Success list, select PingID - (Adapter).
-
In the Fail list, select Done.
-
In the Success list, select cyberark - (Policy Contract).
-
In the Success list, where PingID - (Adapter) is selected, click Options.
Result:
A new Incoming User ID modal opens.
-
In the Source list, select Adapter (HTMLForm).
-
In the Attribute list, select username. Click Done to close and exit the modal.
-
On the Policy page, click Done to return to the Authentication Policies configuration page.
-
In the Policy Contracts section, click Contract Mapping for the CyberArk policy contract.
Result:
A new Authentication Policy Contract Mapping page opens.
-
On the Attribute Sources & User Lookup tab, click Next.
-
On the Contract Fulfillment tab, in the Source list, select Adapter (HTMLForm).
-
In the Value list, select username. Click Next.
-
On the Issuance Criteria tab, click Next.
-
On the Summary tab, click Done to return to the Authentication Policies window configuration.
-
Click Save. Click Done.
-