This topic describes how an administrator can test the connection between Single Sign‑On for VMware Tanzu Application Service and PingFederate. An administrator can test both service provider and identity provider connections.

You can test your identity provider integration by deploying the Pivotal Single Sign-On Service Sample Applications.

Test Your Service Provider Connection

  1. Log in to Apps Manager at https://apps.SYSTEM-DOMAIN and navigate to the org and space where your app is located.

  2. Under Services, locate the service instance of the Single Sign‑On plan bound to your app. Click the service instance and then click Manage.

    Screenshot of overview tab in Apps Manager. Under the Services section, the
button for the Single Sign-On service is highlighted.

    Screenshot of the Single Sign-On service screen in Apps Manager.
Below the title, the manage link is highlighted.

  3. Under the Apps tab, click your app.

    Screenshot of the Apps tab in Apps Manager showing a tile for the authcode-sample app.

  4. Under Identity Providers, select the PingFederate identity provider.

    Screenshot of the app configuration screen. The PingFederate PCF SSO button in the Identity Providers section is highlighted.

  5. Return to Apps Manager and click the URL below your app to authenticate with the identity provider.

    Screenshot of overview tab in Apps Manager. Under the Apps section, the URL in the Route column of table is highlighted

  6. Click the link to Log in via Auth Code Grant Type.

    A browser window with the authcode sample web app showing. The app has a link at the bottom of the web page with the text Log in via Auth Code Grant Type

  7. On the identity provider sign-in page, enter your credentials and click Sign On.

    Screenshot of the sign-in page with fields to enter a username and password. Below is the Login button.

  8. The app asks for authorization to the necessary scopes. Click Authorize.

    Screenshot of the Application Authorization page for the authcode sample app. There are check boxes for two scopes: openid and Read TODO list. Both checkboxes are selected. At the bottom of the page, there are buttons for Deny and Authorize.

  9. View the access token and ID token.

    ![Screenshot of a page showing JSON for the result of calling /userinfo, the access token that was used, and the ID token. At the bottom of the page there are links for TODO list, See your account profile, and Log out.]../images/pingfederate_authcode_sample_code.png)

Test Your Identity Provider Connection

Note: Single Sign‑On does not support identity provider-initiated flow into apps, but it does redirect the user to the User Account and Authentication (UAA) page to select apps assigned to the user.

  1. Sign in to PingFederate.

    Screenshot of the sign-in page with fields to enter a username and password. Below is the Login button.

  2. Navigate to your app and click it.

  3. View the list of apps you have access to.

    Screenshot of Apps Manager apps tab with tiles for three apps shown.

Test Your Single Sign-Off

Test single sign-off to ensure that when users log out of the app, they are logged out of PingFederate as well.

  1. Sign into the sample app. Information about the access and ID token displays, as well as the What do you want to do? section.
  2. Under What do you want to do?, click Log out.

    Link in the What do you want to do section. There are links for TODO list, See your account profile, and Log out.

  3. Ensure that you are logged out and redirected to the PingFederate login page.

    Screenshot of the sign-in page with fields to enter a username and password. Below is the Login button.

check-circle-line exclamation-circle-line close-line
Scroll to top icon