Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The PingFederate connector uses OpenID Connect to federate authentication with PingFederate. It usestype: pingfederate in the connector configuration and supports standard OIDC flows — allowing you to extend PingFederate authentication to applications that don’t natively support modern identity protocols.
This connector integrates with PingFederate, Ping Identity’s on-premises federation server. The connector type in YAML is
pingfederate.Use Cases
- PingFederate SSO federation — Extend PingFederate authentication to applications that don’t natively support OIDC
- Multi-IdP orchestration — Route authentication to PingFederate alongside other identity providers
- Legacy app modernization — Bridge PingFederate-authenticated users to legacy applications via header or cookie injection
Configuration
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Configuration Reference
| Key | Type | Required | Description |
|---|---|---|---|
name | string | Yes | Unique connector identifier referenced in app policies |
type | string | Yes | Must be pingfederate |
oidcWellKnownURL | string | Yes | OIDC discovery endpoint URL for your PingFederate server |
oauthClientID | string | Yes | OAuth 2.0 client ID from PingFederate |
oauthClientSecret | string | Yes | OAuth 2.0 client secret (use secret reference syntax) |
oauthRedirectURL | string | Yes | Callback URL registered with the PingFederate client |
scopes | string | No | Space-separated OAuth scopes (default: openid profile email) |
oauthExtraParams | map | No | Additional query parameters for the authorization request |
tls | string | No | Named TLS profile for provider communication |
Troubleshooting
- Verify the
oidcWellKnownURLis accessible from the Orchestrator host — ensure the PingFederate hostname and port are correct - Ensure the
oauthRedirectURLmatches exactly what is registered in the PingFederate client configuration - Check that the client secret reference resolves correctly via your secret provider