PingOne Advanced Services

Configuring connections for SSO

To allow administrators to use single-sign on (SSO) to access PingOne Advanced Services and the appropriate admin consoles, configure the connections.

PingOne Advanced Services version 1.19.1 is required to configure a connection to PingOne.

Before you begin

Ensure that:

  • Your PingOne environment is provisioned.

  • You have administrator credentials to sign on to the environment.

  • You have the region domain and environment ID for the PingOne Advanced Services environment, which you can get from your Ping Identity team members.

Regardless of which method you choose, you’ll need to complete these steps:

Steps

  1. Create custom attributes to authenticate users when they sign on.

  2. Create an OIDC application and configure it to connect the PingOne environment to the PingOne Advanced Services environment.

  3. Configure the identity provider. There are a variety of ways the identity provider (IdP) can be configured.

    Users can be managed:

    1. In the same PingOne environment that contains the OIDC application connection to PingOne Advanced Services, which is the default.

    2. In a PingOne environment that does not contain the OIDC application connection.

    3. By another identity provider who uses OIDC.

  4. If you have the Postman application, you can validate the configuration by running a Postman collection.

  5. Submit a service request to the Support and Professional Services teams to provide them with details regarding the OIDC application and the name that should display when users sign on.

If users report that they can’t access the admin consoles, see Troubleshooting, which provides step-by-step instructions for troubleshooting the connections.

Creating custom user attributes

Create custom user attributes that you will use to authenticate users. You can use the P1AS Customer Tenant Configuration Postman collection, or add the attributes manually.

If you’re using Postman

Steps

  1. Navigate to the first step in the collection: P1AS Customer Tenant Configuration → Tenant Configuration → Step 1. Create User Custom Attributes.

  2. Drag and drop the step into the Run order window.

  3. Click Run and determine if issues exist.

If you’re creating the application manually

Steps

  1. Go to Applications → Applications.

  2. Click the icon.

  3. Complete the following fields:

    1. Application Name: Enter the name of the application.

    2. Description: Enter a meaningful description for the application.

    3. Application Type: Select OIDC Web App.

  4. Click Save.

  5. On the Configuration tab, enter the appropriate URL in the Redirect URIs field using the following format:

    https://auth.pingone.com/<REGION_ID>/rp/callback/openid_connect

    Use the REGION_ID provided by your Ping Identity team members.

  6. Click Save.

  7. Add an MFA (multi-factor authentication) policy to the application. Learn more in Adding an MFA policy in the PingOne documentation.

    Adding this additional layer of security is highly recommended if your users are created and stored in your PingOne environment. If your users are created and stored in an external IdP, we recommend configuring an MFA policy in the third-party OIDC application that is connected to the external IdP.
  8. On the Attribute Mappings tab, enter the following mappings:

    “sub” = “User ID”
    “email” = “Email Address”
    “familyName” = “Family Name”
    “givenName” = “Given Name”
    “username” = “Username”
    “p1asArgoCDRoles” = “P1AS ArgoCD Roles”
    "p1asGrafanaRoles” = “P1AS Grafana Roles”
    “p1asOpensearchRoles” = “P1AS Opensearch Roles”
    “p1asPingAccessRoles” = “P1AS PingAccess Roles”
    “p1asPingFederateRoles” = “P1AS PingFederate Roles”
    “p1asPrometheusRoles” = “P1AS Prometheus Roles”
    "p1asSelfServiceRoles" = "P1AS Self-Service Roles"
  9. Click Save and click the toggle switch to enable the application.

Creating an OIDC application

Now, create an OpenID Connect (OIDC) application and configure it to connect the PingOne environment to the PingOne Advanced Services environment.

You can use the P1AS Customer Tenant Configuration Postman collection, or create the application manually.

If you’re using Postman

Steps

  1. Navigate to the second step in the collection: P1AS Customer Tenant Configuration → Tenant Configuration → Step 2. Create OIDC Application.

  2. Drag and drop the step into the Run order window.

  3. Click Run and determine if issues exist.

  4. Add an MFA (multi-factor authentication) policy to the application. For instructions, see Adding an MFA policy in the PingOne documentation.

    Adding this additional layer of security is highly recommended if your users are created and stored in your PingOne environment. If your users are created and stored in an external IdP, we recommend configuring an MFA policy in the third-party OIDC application that is connected to the external IdP.

If you’re creating the application manually

Steps

  1. Go to Applications → Applications.

  2. Click the icon.

  3. Complete the following fields:

    1. Application Name: Enter the name of the application.

    2. Description: Enter a meaningful description for the application.

    3. Application Type: Select OIDC Web App.

  4. Click Save.

  5. On the Configuration tab, enter the appropriate URL in the Redirect URIs field using the following format:

    https://auth.pingone.com/<REGION_ID>/rp/callback/openid_connect

    Use the REGION_ID provided by your Ping Identity team members.

  6. Click Save.

  7. Add an MFA (multi-factor authentication) policy to the application. Learn more in Adding an MFA policy in the PingOne documentation.

    Adding this additional layer of security is highly recommended if your users are created and stored in your PingOne environment. If your users are created and stored in an external IdP, we recommend configuring an MFA policy in the third-party OIDC application that is connected to the external IdP.
  8. On the Attribute Mappings tab, enter the following mappings:

    “sub” = “User ID”
    “email” = “Email Address”
    “familyName” = “Family Name”
    “givenName” = “Given Name”
    “username” = “Username”
    “p1asArgoCDRoles” = “P1AS ArgoCD Roles”
    "p1asGrafanaRoles” = “P1AS Grafana Roles”
    “p1asOpensearchRoles” = “P1AS Opensearch Roles”
    “p1asPingAccessRoles” = “P1AS PingAccess Roles”
    “p1asPingFederateRoles” = “P1AS PingFederate Roles”
    “p1asPrometheusRoles” = “P1AS Prometheus Roles”
    "p1asSelfServiceRoles" = "P1AS Self-Service Roles"
  9. Click Save and click the toggle switch to enable the application.

Configuring the identity provider

There are a variety of ways the identity provider can be configured:

Users are managed in the same environment that contains the OIDC application

In this configuration, which is the default, users are managed in the same environment as the OIDC application, which connects to PingOne Advanced Services, as shown in the diagram.

Network diagram
Screen capture of the default network configuration.

If you have this type of configuration, most of your work is done.

  1. First, submit a service request to the Support and Professional Services teams to provide them with details regarding the OIDC application and the name that should display when users sign on.

  2. Then, you can begin adding users to this environment and assigning roles. You can find a complete list of PingOne Advanced Services attribute mappings for each administrator role and the permissions each role is assigned in the administrative role mappings.

Users are managed in an environment that does not contain the OIDC application

In this configuration, users are managed in a PingOne environment that does not contain the OIDC application that connects to PingOne Advanced Services, as shown in the diagram.

Network diagram
Diagram of a network where users are managed in an environment that does not contain the OIDC application.

If you have this type of configuration, you need to configure a connection from the environment containing your users to the environment containing the OIDC application that connects to PingOne Advanced Services:

  1. Access the PingOne environment that contains your users and complete the steps listed here.

  2. Access the PingOne environment that contains the OIDC application, which connects to PingOne Advanced Services, and complete the steps listed here.

  3. Access the PingOne environment that contains your users and complete the process.

1. Access the PingOne environment that contains your users

  1. Ensure that the custom user attributes are defined, as described in Creating custom user attributes.

  2. Create a new OIDC application to connect these environments. Learn how to create this application in Creating an OIDC application.

  3. Copy and save the application client ID, client secret, and OIDC Discovery Endpoint URL, which you’ll need to provide in the next task.

2. Access the PingOne environment that contains the OIDC application, which connects to PingOne Advanced Services

  1. Access the appropriate PingOne environment.

  2. Create an external IdP to configure a connection to the user environment:

    1. Go to Integrations → External IdPs.

    2. Click Add Provider.

    3. Click OpenID Connect.

    4. On the Create Profile page, enter the following:

      • Name: A unique identifier for the IdP.

      • Description (optional): A brief description of the IdP.

      • Icon (optional): An image to represent the identity provider. Use a file up to 1 MB in JPG, JPEG, GIF, or PNG format. Use a 90 X 90 pixel image.

      • Login button (optional): An image to use for the login button displayed to the end user. Use a 300 X 42 pixel image.

    5. Click Continue.

    6. Enter the connection and discovery details you copied and saved in step 3 of the previous task:

      • Client ID: Enter the client ID for the OIDC application you just created.

      • Client secret: Enter the client secret generated for the OIDC application.

      • Discovery document URI: Enter the OIDC Discovery Endpoint URL from the OIDC application, and then click Use Discovery document to populate the remaining settings. Learn more in Discovery document URI in the PingOne documentation.

    7. Click Save and Continue.

    8. On the Map Attributes page enter the following mappings:

      “Username” = “providerAttributes.username”
      “External ID” = “providerAttributes.sub”
      “Email” = “providerAttributes.email”
      “Family Name” = “providerAttributes.familyName”
      “Given Name” = “providerAttributes.givenName”
      “P1AS ArgoCD Roles” = “providerAttributes.p1asArgoCDRoles
      “P1AS Grafana Roles” = “providerAttributes.p1asGrafanaRoles”
      “P1AS Opensearch Roles” = “providerAttributes.p1asOpensearchRoles”
      “P1AS PingAccess Roles” = “providerAttributes.p1asPingAccessRoles”
      “P1AS PingFederate Roles” = “providerAttributes.p1asPingFederateRoles”
      “P1AS Prometheus Roles” = “providerAttributes.p1asPrometheusRoles”
      "P1AS Self-Service Roles" = "providerAttributes.p1asSelfServiceRoles"
    9. Click Save and Finish.

    10. Locate the new external IdP in the list, expand it, and click the Connections tab.

    11. Copy and save the Callback URL to use in a later step.

    12. Click the toggle switch to enable the application.

  3. Create an authentication policy for the external IdP:

    1. Go to Authentication → Authentication.

    2. Click Add Policy.

    3. Enter a policy name.

    4. From theStep Type list, select External identity provider.

    5. From the External identity provider list, select the external provider you just configured and click Save.

  4. Add the authentication policy to the OIDC application:

    1. Go to Applications → Applications, and select the OIDC application you created in the previous step.

    2. Select the Policies tab and click Add Policies.

    3. Select the authentication policy you created in the previous step and click Save.

3. Access the PingOne environment that contains your users

  1. Go to Applications → Applications, and select the new OIDC application.

  2. Click the Configuration tab and then click the Pencil icon.

  3. In the Redirect URIs field, enter the Callback URL you copied and saved in the previous task and click Save.

  4. Submit a service request to the Support and Professional Services teams to provide them with details regarding the OIDC application and the name that should display when users sign on.

  5. Now, you can begin adding users to this environment and assigning roles. You can find a complete list of PingOne Advanced Services attribute mappings for each administrator role and the permissions each role is assigned in Administrative role mappings.

Users are managed by another identity provider

In this configuration, users are managed in your PingOne environment that does not contain the OIDC application connection, as shown in the diagram.

Network diagram
Diagram of a network where users are managed by another identity provider.

If you have this type of configuration, you need to configure a connection from the external identity provider that manages your users to the PingOne environment that contains the OIDC application that connects PingOne to PingOne Advanced Services.

  1. Access the external identity provider environment that contains your users and complete the steps listed here.

  2. Access the PingOne environment that contains the OIDC application and complete the steps listed here.

  3. Access the external identity provider environment that contains your users and complete the process.

1. Access the external identity provider environment that contains your users

  1. Ensure that the custom user attributes are defined as described in Creating custom attributes.

  2. Create a new OIDC application to connect these environments.

    1. Go to Applications → Applications.

    2. Complete the following fields:

      • Application Name: Enter the name of the application.

      • Description: Enter a meaningful description for the application.

      • Application Type: Select OIDC Web App.

    3. On the Configuration tab, click the Pencil icon, select the following options, and click Save.

      • In the Response Type field, select Code.

      • In the Grant Type field, select Authorization Code.

      • In the Token Auth Method field, select Client Secret Basic.

    4. Add a multi-factor authentication (MFA) policy to the application. Refer to your external identity provider documentation for instructions on adding an MFA policy.

    5. Click the Attribute Mappings tab and enter the following mappings:

      “sub” = “User ID”
      “email” = “Email Address”
      “familyName” = “Family Name”
      “givenName” = “Given Name”
      “username” = “Username”
      “p1asArgoCDRoles” = “P1AS ArgoCD Roles”
      “p1asGrafanaRoles” = “P1AS Grafana Roles”
      “p1asOpensearchRoles” = “P1AS Opensearch Roles”
      “p1asPingAccessRoles” = “P1AS PingAccess Roles”
      “p1asPingFederateRoles” = “P1AS PingFederate Roles”
      “p1asPrometheusRoles” = “P1AS Prometheus Roles”
      "p1asSelfServiceRoles" = "P1AS SelfService Roles"
    6. Click the toggle switch to enable the application.

    7. Copy and save the application client ID, client secret, and OIDC Discovery Endpoint URL, which you’ll need to provide in the next step.

2. Access the PingOne environment that contains the OIDC application

  1. Access the appropriate PingOne environment.

  2. Create an external IdP to configure a connection to the user environment:

    1. Go to Integrations → External IDPs.

    2. Click Add Provider.

    3. Click OpenID Connect.

    4. On the Create Profile page, enter the following:

      • Name: A unique identifier for the IdP.

      • Description (optional): A brief description of the IdP.

      • Icon (optional): An image to represent the identity provider. Use a file up to 1 MB in JPG, JPEG, GIF, or PNG format. Use a 90 X 90 pixel image.

      • Login button (optional): An image to use for the login button displayed to the end user. Use a 300 X 42 pixel image.

    5. Click Continue.

    6. Enter the connection and discovery details you copied and saved in step 2 of the previous task:

      • Client ID: Enter the client ID for the OIDC application you just created.

      • Client secret: Enter the client secret generated for the OIDC application.

      • Discovery document URI: Enter the OIDC Discovery Endpoint URL from the OIDC application, and then click Use Discovery document to populate the remaining settings. Learn more in Discovery document URI in the PingOne documentation.

    7. Click Save and Continue.

    8. On the Map Attributes page enter the following mappings:

      “Username” = “providerAttributes.username”
      “External ID” = “providerAttributes.sub”
      “Email” = “providerAttributes.email”
      “Family Name” = “providerAttributes.familyName”
      “Given Name” = “providerAttributes.givenName”
      “P1AS ArgoCD Roles” = “providerAttributes.p1asArgoCDRoles
      “P1AS Grafana Roles” = “providerAttributes.p1asGrafanaRoles”
      “P1AS Opensearch Roles” = “providerAttributes.p1asOpensearchRoles”
      “P1AS PingAccess Roles” = “providerAttributes.p1asPingAccessRoles”
      “P1AS PingFederate Roles” = “providerAttributes.p1asPingFederateRoles”
      “P1AS Prometheus Roles” = “providerAttributes.p1asPrometheusRoles”
      "P1AS SelfService Roles" = "providerAttributes.p1asSelfServiceRoles"
    9. Click Save and Finish.

    10. Locate the new external IdP in the list, expand it, and click on the Connections tab.

    11. Copy and save the Callback URL to use in a later step

    12. Click the toggle switch to enable the application.

  3. Create an authentication policy for the external IdP:

    1. Go to Authentication → Authentication.

    2. Click Add Policy.

    3. Enter a policy name.

    4. From the Step Type list, select External identity provider.

    5. From the External identity provider list, select the external provider you just configured and click Save.

  4. Add an authentication policy to the OIDC application:

    1. Go to Applications → Applications, and select the OIDC application you created in the previous step.

    2. Select the Policies tab and click Add Policies.

    3. Select the authentication policy you created in the previous step and click Save.

3. In the external identity provider environment that contains your users

  1. Go to Applications → Applications and select the new OIDC application.

  2. Click the Configuration tab and then click the Pencil icon.

  3. In the Redirect URIs field, enter the Callback URL you copied and saved in the previous task and click Save.

  4. Submit a service request to the Support and Professional Services teams to provide them with details regarding the OIDC application and the name that should display when users sign on.

  5. Now, you can begin adding users to this environment and assigning roles. You can find a complete list of PingOne Advanced Services attribute mappings for each administrator role and the permissions each role is assigned in Administrative role mappings.

Validating the configuration

If you have Postman, you can validate the configuration by running Postman collections.

To validate the custom user attributes that you created:

  1. Navigate to the following folder:

    P1AS Customer Tenant Configuration → Tenant Validation → Validate User Attributes

  2. Drag and drop the step into the Run order window.

  3. Click Run and determine if issues exist.

To validate the OIDC application that you created:

  1. Navigate to the following folder:

    P1AS Customer Tenant Configuration → Tenant Validation → Validate OIDC application

  2. Drag and drop the step into the Run order window.

  3. Click Run and determine if issues exist.

Submitting a service request

To complete the connection, submit a service request through the Support Portal.

Steps

  1. Complete the following fields:

    • Subject: Enter a description of your request, including the action to be taken.

    • Environment Type: Specify the type of environment affected by this request.

    • Proposed Change Window: Specify the dates or times in which you want the work complete.

  2. In the Capability list, select Advanced/Other.

  3. In the Business Priority list, select the appropriate description:

    • Change needed by deadline to avoid business impact

    • Change modifies existing functionality

    • Change adds new functionality

  4. In the Description field, provide the following information regarding the OIDC application you created:

    • The Client ID, which displays on the OIDC application Overview page.

    • The Client Secret, which also displays on the OIDC application Overview page.

    • The Issuer URL, which displays on the OIDC application Configuration page, in the URLs section.

    • The Display Name, which is the name that you want displayed to your users when they sign on, as shown here.

    Screen capture of a sign-on page.
  5. If you are tracking your request within your organization, enter the tracking ID or ticket number associated with it in the Customer Tracking ID field.

  6. To submit your request, click Save.

Configuring Postman

If you plan to use Postman to configure your connections, you’ll need to ensure that several collection variables are set and that Postman is correctly configured. You’ll also need to download the collection. Learn more in Download the Postman collection.

Steps

  1. Add the API domain for your PingOne region to the collection variable apiPath, and then add the auth domain for the region to the collection variable authPath. Learn more in API requests in the PingOne Developers documentation.

  2. Get an access token from a worker application. You can use an existing worker application or create a new one.

    Either way, ensure that the Environment Admin and Client Application Developer roles are assigned. Learn more in Create an admin Worker app connection in the PingOne Developers documentation.

    Then, get the token. Learn more in Get a PingOne admin access token in the PingOne Developers documentation.

    To get a token from a different worker application in a different sandbox environment, run the token request endpoint using the client ID and client secret of the worker application to authenticate the request. Learn more in Worker applications in the PingOne Developers documentation.

    Add the access token to the collection variable accessToken.

  3. Choose the PingOne environment that will act as the OIDC identity provider, which will connect to the PingOne Advanced Services environment.

  4. Add the environment ID to the collection variable envID.

  5. Request the region domain and environment ID for your primary region from PingOne Advanced Services.

  6. Add the auth domain for the PingOne Advanced Services environment to the collection variable p1asAuthPath.

  7. Add the environment ID for the PingOne Advanced Services tenant to the collection variable p1asEnvID.

Download the Postman collection

There are two different methods you can use to retrieve a Postman collection into your workspace:

  1. Fork the collection into your workspace. The Postman application retains an association between the source and your fork. If Ping Identity changes the source collection, you can pull those changes into the fork in your workspace.

  2. Import the collection into your workspace. This is a one-time transfer and retains no association to the source collection.

Steps

To retrieve the collection:

  1. Click Run in Postman.

  2. At the prompt, click Fork Collection at the bottom of the dialog or click import a copy near the bottom of the dialog.

    You must be signed on to your Postman account to retrieve the collection.

    Screen capture of the screen that offers the options to either fork the collection or import a copy.
  3. Follow the on-screen instructions to fork or import the collection. You might be prompted to open your Postman app and to select a Postman workspace for the retrieved collection.

When you fork a Postman collection, you create a copy of it in a different workspace. Forking a collection creates a linked version that synchronizes with its source collection.

You’ll see this synchronization when you click the ellipsis icon on the forked collection. If changes are available, the context menu displays a Pull changes button, which you can click to compare the fork to the source collection and pull changes into your fork. You can also watch the collection so that you are notified when the source changes.

If you import a collection, a copy is created with no link back to the source. The collection is static, which might be useful in some situations. For example, if you intend to keep and consume only portions of the collection, a link back to the source is not needed.

But you don’t have to choose between these two methods. You can fork a copy to track the source and import a copy for experimentation.

The environment downloaded with the collection of requests contains every variable used in the collection. Each request that creates a new object with an ID has a script that:

  1. If not available, create an environment variable unique to that service.

  2. Assigns the id of the newly created object to that environment variable.

Troubleshooting

If your users are having trouble accessing their admin consoles, determine where the users are managed and complete the appropriate set of steps:

Users are managed in a PingOne environment

If your users are managed in a PingOne environment, test the connection between that environment and the environment containing the OIDC application that connects to PingOne Advanced Services.

About this task

To test this connection, create a test user in the environment and use the new user credentials to sign on to the appropriate console.

Steps

Use Postman to create the test user, or create the user manually.

If you’re using Postman:

  1. Navigate to the following step in the collection:

    P1AS Customer Tenant Configuration → Troubleshooting → Create Test User to Validate P1AS Connection.

  2. Drag and drop the step into the Run order window.

  3. Click Run and determine if issues exist.

If you’re creating a test user manually:

  1. Ensure that the user is added to the appropriate population and that the appropriate IdP is selected. For instructions, see Adding a user in the PingOne documentation.

  2. Assign the user the appropriate roles and user attributes. You can find a complete list of PingOne Advanced Services attribute mappings for each administrator role, and the permissions each role is assigned, in Administrative role mappings.

  3. Use the appropriate console URL and the new test user’s credentials to sign on.

    If you’re able to sign on, that means that the connection works and the issue likely involves users’ roles, permissions, or the user attributes assigned.

  4. If you’re not able to sign on, access the user’s profile and determine if they have the appropriate roles and user attributes assigned.

Users are managed by an external identity provider

If your users are managed by an external identity provider, test the connections between the environments.

About this task

There are two different connections to test:

  • The connection between the environment containing the users and the environment containing the OIDC application. To test this connection, complete the troubleshooting steps outlined in Users are managed in a PingOne environment.

  • The connection between the external IdP and the environment that contains the OIDC application.

To test this connection, attempt to access the admin consoles from the external identity provider:

Steps

  1. Get the username and password for the user.

  2. Open a browser window and enter the admin console URL.

  3. Enter the username and password and click Sign On.

    • If you’re able to sign on, that means that the connection works.

    • If you’re not redirected to the external identity provider, ensure that the authentication policy that the OIDC application is using includes the external identity provider:

    • If you receive an error message regarding missing roles:

      • Ensure that the user has the appropriate roles and attributes assigned.

      • Ensure that the custom user attributes are correctly defined and mapped.

Administrative role mappings

Refer to the following:

Argo CD roles

Argo CD attribute mappings and permissions
Attribute mapping Permissions

argo-configteam

Argo CD restart statefulset access for the Dev and Test environments.

Grafana roles

Grafana attribute mappings and permissions
Attribute mapping Permissions

dev-graf-editor

Grafana editor access for the Dev environment.

test-graf-editor

Grafana editor access for the Test environment.

stage-graf-editor

Grafana editor access for the Stage environment.

prod-graf-editor

Grafana editor access for the Prod environment.

OpenSearch roles

OpenSearch attribute mappings and permissions
Attribute mapping Permissions

os-configteam

OpenSearch admin access for all environments.

PingAccess roles

PingAccess attribute mapping and permissions
Attribute mapping Permissions

dev-pa-admin

PingAccess admin access for the Dev environment.

dev-pa-audit

PingAccess audit access for the Dev environment.

dev-pa-platform

PingAccess platform access for the Dev environment.

test-pa-admin

PingAccess admin access for the Test environment.

test-pa-audit

PingAccess audit access for the Test environment.

test-pa-platform

PingAccess platform access for the Test environment.

stage-pa-admin

PingAccess admin access for the Stage environment.

stage-pa-audit

PingAccess audit access for the Stage environment.

stage-pa-platform

PingAccess platform access for the Stage environment.

prod-pa-admin

PingAccess admin access for the Prod environment.

prod-pa-audit

PingAccess audit access for the Prod environment.

prod-pa-platform

PingAccess platform access for the Prod environment.

PingFederate roles

PingFederate attribute mapping and permissions
Attribute mapping Permissions

dev-pf-audit

PingFederate audit access for the Dev environment.

dev-pf-crypto

PingFederate crypto access for the Dev environment.

dev-pf-expression

PingFederate expression access for the Dev environment.

dev-pf-roleadmin

PingFederate role admin access for the Dev environment.

dev-pf-useradmin

PingFederate user admin access for the Dev environment.

test-pf-audit

PingFederate audit access for the Test environment.

test-pf-crypto

PingFederate crypto access for the Test environment.

test-pf-expression

PingFederate expression access for the Test environment.

test-pf-roleadmin

PingFederate role admin access for the Test environment.

test-pf-useradmin

PingFederate user admin access for the Test environment.

stage-pf-audit

PingFederate audit access for the Stage environment.

stage-pf-crypto

PingFederate crypto access for the Stage environment.

stage-pf-expression

PingFederate expression access for the Stage environment.

stage-pf-roleadmin

PingFederate role admin access for the Stage environment.

stage-pf-useradmin

PingFederate user admin access for the Stage environment.

prod-pf-audit

PingFederate audit access for the Prod environment.

prod-pf-crypto

PingFederate crypto access for the Prod environment.

prod-pf-expression

PingFederate expression access for the Prod environment.

prod-pf-roleadmin

PingFederate role admin access for the Prod environment.

prod-pf-useradmin

PingFederate user admin access for the Prod environment.

Prometheus roles

Prometheus attribute mapping and permissions
Attribute mapping Permissions

prom

Prometheus admin access for all environments.

Self-Service roles

Self-Service attribute mappings and permissions
Attribute mapping Permissions

dev-tls-audit

TLS read-only access for the Dev environments.

dev-tls-admin

TLS admin access for the Dev environment.

test-tls-audit

TLS read-only access for the Test environment.

test-tls-admin

TLS admin access for the Test environment.

stage-tls-audit

TLS read-only access for the Stage environment.

stage-tls-admin

TLS admin access in the Stage environment.

prod-tls-audit

TLS read-only access for the Prod environment.

prod-tls-admin

TLS admin access for the Prod environment.

all-tls-audit

TLS read-only audit access for all environments.

all-tls-admin

TLS admin access for all environments.