PingFederate 12.0 - My Page SSO Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO (OIDC).Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Applications > My Applications > Add an Application, and click Create From Template.
- Click Select against OIDC.
- On the Basic Information page, enter a name for the application in the Name field.
- Click Next Step.
- Choose the required option on the Authentication page and click Next Step.
- Under Connection Profile, provide the following details:
- Specify the Connection URL as follows: https://<pingfederate_host>:<pingfederate_port>/pingfederate/app
- pingfederate_host: The host name that the user will use to access the PingFederate console.
- Pingfederate_port: The port on which the PingFederate console runs. The default value is 9999
- Authorization Server Issuer URL will be auto populated. This URL is used on the PingFederate side to form Callback URL, Token Endpoint URL and Authorize Endpoint URL.
- Specify the Redirect URL as follows: https://<pf_admin_hostname>:<pf_admin_port>/pingfederate/app?service=finishsso
- Provide a Client ID and take note of its value as it will be used in PingFederate configuration.
- Select Client Authentication Method, the PingFederate console only supports three methods: 'CLIENT_SECRET_BASIC', 'CLIENT_ SECRET_POST', 'PRIVATE_KEY_JWT'.
- Provide a Client Secret or generate one.
- Provide the scope as 'openid' (Scopes should be added beforehand. See Notes section.)
- Provide the claims as 'sub' and 'admin_role' (Claims should be added beforehand. See Notes section.)
- sub is the email of the user.
- admin_role is the role for the user.
- Specify the Connection URL as follows: https://<pingfederate_host>:<pingfederate_port>/pingfederate/app
- Click Next Step.
- On the Portal Display page, configure the portal display and other settings. Click Save and Finish.
- Click Publish Changes.
Notes
- To add scopes, go to Access > OIDC Settings.
- Click the Scopes tab and add the following scopes.
- To add claims, click the Claims tab and add the following claims.
Configure PingFederate 12.0
Perform these steps to configure PingFederate 12.0Procedure
You need to enable OIDC-based authentication for the administrative console by setting a property in the 'run.properties' file ('<pf_install>/pingfederate/bin/run.properties') and configuring other properties in the 'oidc.properties' file ('<pf_install/pingfederate/bin/oidc.properties').
- Edit the 'run.properties' file and set the 'pf.console.authentication' property to 'OIDC'.
- Edit the 'oidc.properties' file and modify the applicable properties accordingly.
| Property | Value | Note |
| client.id | Value of Client ID defined in RSA Cloud Authentication Service config. | |
| client.authn.method | The Client Authentication Method previously selected in RSA Cloud Authentication Service config. | PingFederate console only supports three methods: CLIENT_SECRET_BASIC, CLIENT_ SECRET_POST, PRIVATE_KEY_JWT |
| client.secret | Value of Client Secret defined in RSA Cloud Authentication Service config. | This property is required when the client authentication is either CLIENT_SECRET_BASIC or CLIENT_ SECRET_POST. |
| authorization.endpoint | Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + /auth | Make sure /auth is appended to the Authorization Server Issuer URL |
| token.endpoint | Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + /token | Make sure /token is appended to the Authorization Server Issuer URL. |
| Issuer | Authorization Server Issuer URL obtained from RSA Cloud Authentication Service. | |
| Scopes | Openid | The value provided is matched with the scopes added in RSA Cloud Authentication Service. |
| username.attribute.name | Sub | This value is reflected in RSA Cloud Authentication Service claims. |
| role.attribute.name | admin_role | This value is reflected in RSA Cloud Authentication Service claims. |
| role.admin | Admin | |
| role.expressionAdmin | Admin |
- Restart the PingFederate service after completing the previous steps.
Return to PingFederate 12.0 - RSA Ready Implementation Guide
Related Articles
Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 204Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 186Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 500Number of Views JAMF Connect - My Page SSO Configuration using OIDC- RSA Ready Implementation Guide 8Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 117Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA MFA Agent 2.4.3 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.8 Setup and Configuration Guide RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?