PingFederate 12.0 - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide
2 years ago
This article describes how to integrate PingFederate 12.0 with RSA Cloud Authentication Service using Relying Party (OIDC).

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service as Relying Party to PingFederate 12.0 using OIDC.
Procedure
  1. Sign in to RSA Cloud Administration Console.
  2. Click Authentication Clients > Relying Parties.image.png
  3. On the My Relying Parties page, click Add a Relying Party.
image.png
  1. On the Relying Party Catalog page, click Add for Generic OIDC.image.png
  2. On the Basic Information page, enter the name for the Service Provider in the Name field.
  3. Click Next Step.
  4. On the Authentication page, choose SecurID Access manages all authentication.
  5. In the Primary Authentication Method list, select your desired login method as either Password or SecurID.
  6. In the Access Policy list, select a policy that was previously configured.image.png
  7. Click Next Step.
  8. Under Connection Profile, provide the following details:
    1. Authorization Server Issuer URL will be auto populated. This URL is used on the PingFederate side to form Callback URL, Token Endpoint URL and Authorize Endpoint URL.
    2. Specify the Redirect URL as follows: https://<pf_admin_hostname>:<pf_admin_port>/pingfederate/app?service=finishsso 
    3. Provide a Client ID and take note of its value as it will be used in PingFederate configuration.
    4. Select Client Authentication Method, the PingFederate console only supports three methods: 'CLIENT_SECRET_BASIC', 'CLIENT_ SECRET_POST', 'PRIVATE_KEY_JWT'.
    5. Provide a Client Secret or generate one.
    6. Provide the scope as 'openid' (Scopes should be added beforehand. See Notes section.) 
    7. Provide the claims as 'sub' and 'admin_role' (Claims should be added beforehand. See Notes section.)
      • sub is the email of the user.
      • admin_role is the role for the user.
image.png
  1. Click Save and Finish.
  2. Click Publish Changes.

Notes

  1. To add scopes, go to Access OIDC Settings.image.png
  2. Click the Scopes tab and add the following scopes.image.png
  3. To add claims, click the Claims tab and add the following claims.image.png
 

Configure PingFederate 12.0

Perform these steps to configure PingFederate 12.0
Procedure
You need to enable OIDC-based authentication for the administrative console by setting a property in the 'run.properties' file ('<pf_install>/pingfederate/bin/run.properties') and configuring other properties in the 'oidc.properties' file ('<pf_install/pingfederate/bin/oidc.properties'). 
  1. Edit the 'run.properties' file and set the 'pf.console.authentication' property to 'OIDC'.
  2. Edit the 'oidc.properties' file and modify the applicable properties accordingly.
PropertyValueNote
client.idValue of Client ID defined in RSA Cloud Authentication Service config. 
client.authn.methodThe Client Authentication Method previously selected in RSA Cloud Authentication Service config.PingFederate console only supports three methods: CLIENT_SECRET_BASIC, CLIENT_ SECRET_POST, PRIVATE_KEY_JWT
client.secretValue of Client Secret defined in RSA Cloud Authentication Service config.This property is required when the client authentication is either CLIENT_SECRET_BASIC or CLIENT_ SECRET_POST.
authorization.endpointAuthorization Server Issuer URL obtained from RSA Cloud Authentication Service + /authMake sure /auth is appended to the Authorization Server Issuer URL
token.endpointAuthorization Server Issuer URL obtained from RSA Cloud Authentication Service + /tokenMake sure /token is appended to the Authorization Server Issuer URL.
IssuerAuthorization Server Issuer URL obtained from RSA Cloud Authentication Service. 
ScopesOpenidThe value provided is matched with the scopes added in RSA Cloud Authentication Service.
username.attribute.nameSubThis value is reflected in RSA Cloud Authentication Service claims.
role.attribute.nameadmin_roleThis value is reflected in RSA Cloud Authentication Service claims.
role.adminAdmin 
role.expressionAdminAdmin 
  1. Restart the PingFederate service after completing the previous steps.
The configuration is complete.
Return to PingFederate 12.0 - RSA Ready Implementation Guide