PingFederate configuration tips
OIDC: Authorization Code + PKCE
- Create OAuth > Clients — enable authorization_code and refresh_token, require PKCE (S256).
- Assign Allowed Scopes (openid, profile, email). Map attributes via Attribute Contract.
- Choose Signing Key (RS256/ES256) and expose JWKS at
/pf/JWKS. - Set Redirect URIs and Post-Logout Redirect URIs.
- Configure IdP Adapter (HTML Form or Kerberos/Identifier First) and map to policy.
Template: OIDC client JSON
SAML: SP Connection (as IdP)
- Import SP metadata (or use our SP template).
- Set NameID (email or persistent) and add Attribute Contract (given_name, email, role).
- Bindings: HTTP-Redirect for AuthnRequest; HTTP-POST for Response.
- Sign Assertions and optionally encrypt. Share IdP metadata with SP.
SAML: IdP Connection (as SP)
- Import IdP metadata (or use our IdP template).
- ACS URL must match exactly. Enable Allow Unsolicited Responses only if required.
- Validate signature; set Certificate Revocation and clock skew.
Endpoints (typical)
Authorization: https://AUTH_HOST/as/authorize
Token: https://AUTH_HOST/as/token.oauth2
UserInfo: https://AUTH_HOST/idp/userinfo.openid
JWKS: https://AUTH_HOST/pf/JWKS
End Session: https://AUTH_HOST/idp/startSLO.ping
SAML SSO: https://AUTH_HOST/idp/SSO.saml2
SAML SLO: https://AUTH_HOST/idp/SLO.saml2
Replace AUTH_HOST with your environment FQDNs and ensure TLS + HSTS.