Ping Directory - Identity Source Cloud Authentication Service Integration - RSA Ready Implementation Guide
This article describes how to integrate Ping Directory as Identity Source with RSA Cloud Authentication Service.
Configure RSA Cloud Authentication Service
Perform the following steps to add Ping Directory as an identity source to RSA Cloud Authentication Service.
Procedure
- Sign in to the RSA Cloud Administration Console.
- Navigate to Users > Identity Sources.
- Click Add Identity Source.
- For New Identity Source type, select LDAP.
- Under Basic Information, enter a name in the Identity Source Name field.
- In Connection Settings section, configure the following fields:
- Root: Enter the distinguished name (DN) for the initial root user used when configuring Ping Directory. This DN is required for establishing a connection to the directory. For example, 'dc=example', 'dc=com'. This value will change based on the configuration done on Ping Directory during setup.
- User Tag (SSO Service Only): Enter 'cn'.
- ObjectClass: Enter 'inetOrgPerson'
- Reset Interval (second): 300
- Under Directory Servers, click ADD.
- In the Directory Server window, configure the following fields and click Save.
- Server: Enter the IP address of the Ping Directory server.
- Port: Enter '389'.
- Cluster: Select the cluster that contains the identity router used for authentication by this directory server.
- Username: Enter the Directory Administrator name.
- Password: Enter the Directory Administrator password.
- In the SSL/TLS Certificates (optional) section, clear the checkbox for Use SSL/TLS encryption to connect to the directory servers. SSL was enabled later. Refer to the Configure SSL section for instruction on enabling SSL.
- Under Directory Servers, click Test Connection. SSL was enabled later, refer to the Configure SSL section for instruction on enabling SSL.
- Ensure that the Test Connection is successful. Verify that directory attributes are displayed under Results, then click Close.
- Under User Attributes, click Refresh Attributes.
- Enable Synchronize the selected policy attributes with the Cloud Authentication Service, then enable checkboxes for policies and apps for attributes that need to be synchronized with Cloud Authentication Service.
- Click Next Step.
- In the Synchronize User Attributes section, specify the following details and click Save and Finish.
- First Name: givenname
- Primary Usename: uid
- Last Name: sn
- Primary Unique Identifier: uid
- Email Address: mail
- Secondary Unique Identifier: uid
- User Account Status: ds-pwp-account-disabled
- UserAccountexpiration: ds-pwp-account-expiration-time
- Alternate Username: userPrincipalName
- Manager: manager
- Click Next Step.
- If selected, clear the checkbox for Allow Users to Change Passwords.
- Click Save and Finish, then click Publish Changes.
- Navigate to Users > Identity Sources, and for the Ping Directory Server, select Synchronization from the Edit dropdown menu.
- On the Synchronization Page, click Synchronize Now.
- Wait for some moments, then click Refresh Status.
- Ensure that synchronization is completed successfully and users are added.
- Navigate to Users > Management.
- Search for a user from the directory server and verify that the user information is displayed.
Configure SSL
Perform the following steps to configure SSL.
Procedure
- Navigate to the bin folder under extracted Ping Directory folder. Run the 'manage-certificates' utility to generate a self-signed certificate if needed. Note that a self-signed certificate can also be created during setup.
- SSH into to the Identity Router management console as 'idradmin' and run the following command:
- openssl s_client -connect <fqdn or ip_address>:<port>
Where '<fqdn or ip_address>' is the IP address domain name of the machine where Ping Directory is installed, and '<port>' is 636.
- Highlight and copy the output starting with '-----BEGIN CERTIFICATE-----' and ending with '----END CERTIFICATE-----'. Ensure that these lines are included. Paste the output into a text editor.
- This procedure does not compromise any private information from the directory server.
- The command only outputs the current public certificate used by the directory server for LDAPS connections, without requiring to login to the directory server and export it.
- Copy the certificate to your local machine and change the format to Windows (CR LF).
- Remove any unwanted spaces from the certificate.
- Save the file with '.cer' extension. Use the Save as option and select All files(*.*) for the file type.
- In the SSL/TLS Certificates section, select the option Use SSL/TLS certificate to connect to Directory servers.
- In the Directory servers section, click the Edit button and change the port to '636'. the rest of the options should remain unchanged.
- Test the connection. It should be successful.
- Save the changes and click Publish.
Notes
- For testing purposes, the ports and other variables were kept at their default settings during Ping Directory setup.
- During setup for our testing, the option “server data is to be encrypted“ was set to No. All other options were kept at their default values.
- Self-signed certificates were used for testing. For production environments, it is recommended to use CA-certified certificates.
- To make the admin console available, install Tomcat (refer to the Ping Directory documentation for supported web servers) on the machine where Ping Directory is installed. Then, copy the file named 'admin-console.war' from the unzipped Ping Directory folder into webapps folder of Tomcat. Refer to the Ping Directory documentation for more details.
Configure Ping Directory
Perform the following steps to configure Ping Directory.
Procedure
- Download the '.zip' distribution of the directory software after obtaining the license, and copy it to your Linux machine.
- Unzip the file using the command: 'unzip PingDirectory<version>.zip'
- Navigate to the unzipped folder and run the setup using the command: './setup'. Refer to the Ping Directory documentation for more details.
Create custom attributes in Ping Directory
Perform the following steps to create custom attributes in Ping Directory.
Procedure
- Log in to Ping Directory admin console with the following URL: http://<IP Address>:8080/admin-console/#/ds/10.0.0.1/schema
Here, '<IP Address>' is the address of the machine where Ping Directory is installed. - To create custom attributes, follow these steps:
- Log in to admin console. Navigate to LDAP Schema located at the top left, then click the Attribute types tab.
- Select New Attribute Type, under Actions dropdown.
- Complete the form with the following values.
- Name: userPrincipalName
- Syntax: DN
- Stored in File: 99-user.ldif
- Repeat the process to create the following custom attributes as shown in the figure.
- UserAccountExpiration
- UserAccountStatus
- UserPrincipalName
The configuration is complete.
Return to Ping Directory- Identity Source Integration - RSA Ready Implementation Guide
Related Articles
How to capture enhanced RSA Authenticator app logs for troubleshooting purposes 258Number of Views Workflow variable ${jobUserData_WorkItemURL} doesn't get resolved for email reminder workflow in RSA Identity Governance a… 180Number of Views Add an Identity Source 290Number of Views 'Host name configured is not listed in subject alternative names of certificate' and 'LDAP_CERT_HOSTNAME_MISMATCH_MSG_SHOR… 331Number of Views Change requests get randomly cancelled and add unrelated activities or continue to provision in RSA Identity Governance & … 551Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?