本文介绍了带有PingIdentity STS的Windows Azure ACS的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

对于真正了解PingIdentity和ACS的人来说,这将是一个真正的问题,这可能是非常有限的.

This is going to be a question really for someone who has knowledge with PingIdentity and ACS, which could be pretty limited.

我已经设置好ACS,并且一切正常,并且我知道如何添加自定义STS(PingIdentity),但是找不到任何要进行身份验证的PingIdentity Federation MetaData(FederationMetaData.xml).

I've got my ACS set up, all working fine and I know how to add a custom STS (PingIdentity) but I can't find any of the PingIdentity Federation MetaData (FederationMetaData.xml) to authenticate with.

显然我们当前系统的工作流程是这样的:

Apparently our current system's workflow is such:

我们->我们的PingIdentity服务器->供应商->供应商的PingIdentity服务器->将令牌路由回给我们.

Us -> Our PingIdentity server -> Supplier -> Supplier's PingIdentity server -> Route token back to us.

我是否必须使用我们本地的PingIdentity Federation MetaData作为STS才能实现所需的功能(相同的情况,但是使用ACS)?在哪里可以找到这个?

Would I have to use our local PingIdentity Federation MetaData as the STS in order to achieve what I'm looking for (same scenario, but with ACS)? And where can I find this?

谢谢.

推荐答案

此文档可能会有所帮助:

This document may help:

AD FS 2.0分步指南:与Ping身份PingFederate联合

尽管它是ADFS而不是ACS(尽管原理相似).

albeit that it's ADFS rather than ACS (although the principles are similar).

第12页显示您需要访问PingFederate管理控制台.你有吗?

Page 12 shows you need access to the PingFederate administrative console. Do you have that?

这篇关于带有PingIdentity STS的Windows Azure ACS的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!

10-12 18:36