Creating the authorization code flow in PingFederate involves creating and configuring an IdP adapter.
Prerequisites
Complete the following tasks:
Log in to the PingFederate Admin console with an Administrator Account.
Procedure
- Create the IdP Adapter.
- Go to .
- Create Create New Instance.
- On the Type tab:
- Instance Name: Enter a name, for example, HTML Form Auth Adapter.
- Instance ID: Enter an ID, for example, HTMLFormAuthAdapter.
- Type: Select HTML Form IdP Adapter.
- Parent Instance: Select None.
- Click Next.
- On the IdP Adapter tab:
Under Password Credential Validator Instance, click Add a new row to 'Credential Validators.' then select a validator (in this documentation, vIDB Validator is used), and click Update.
- On the IdP Adapter tab:
- Realm: Select USER_KEY.
- Click Next.
- Click Next to skip the Extended Contract tab.
- On the Adapter Attributes tab:
- Unique User Key Attribute: Select username and check Pseudonym.
- Click Next to skip the Adapter Contract Mapping tab then click Save.
- Create IdP Adapter Grant Mapping.
- Go to .
- Source Adapter Instance: Select the Adapter instance you just created and click Add Mapping.
- On the Attribute Sources & User Lookup page, click Add Attribute Source.
- Enter the information as follows for each tab, then click Next to advance.
- On the Data Store tab:
- Attribute Source ID: Enter an ID with alphanumeric values.
- Attribute Source Description. Enter a description.
- Active Data Store: Select the active directory in use.
- On the LDAP Directory Search tab:
- Base DN: Enter your base DN to find your users and groups.
- Search Scope: Use the default, Subtree.
- Attributes to return from search: Select <Show All Attributes>, then, once loaded, from the attribute list, select userPrincipalName.
- On the Data Store tab:
- Click Add Attribute then click Next.
- On the LDAP Filter tab:
- Filter: Enter the filter. For example, userPrincipalName=${username}.
- Click Next then click Save.
- In the IdP Adapter Grant Mapping | IdP Adapter Mapping page, finish creating the IdP Grant Mapping.
On the Contract Fulfillment Lookup tab, use the following table.
Contract Source Value USER_KEY Select the source previously created. Subject DN USER_NAME Select the source previously created. userPrincipalName - Click Next then click Save.
The created IdP Adapter Grant Mapping displays as 'Adapter Name' to Persistent Grant Contract.
- Map the IdP Adapter to Access Token Manager.
- Go to
.
- Context: Select IdP Adapter:Adapter Name.
- Access Token Manager: Select the access token manager instance previously created. For example, in this documentation, it is vIDB Access Token Manager.
- Click Add Mapping.
If you do not perform this mapping, PingFederate generates the following log file message:
There are no mapped authentication sources to choose from. Please map an IdP Adapter or IdP connection first.
- Skip the Attribute Sources & User Lookup tab, and on the Contract Fulfillment tab, use the following table.
Contract Source Value aud No Mapping - exp No Mapping - iat No Mapping - iss No Mapping - userName Adapter username - Click Next to skip the Insurance Criteria tab then click Save.
- Go to
.
What to do next
Continue with Install the SCIM Provisioner.