Introduction
This blog article offers a detailed step-by-step guide for configuring PingFederate OpenID authentication with Cognos Analytics. The article demonstrates the configuration requires on the PingFederate Server inorder for it to make a successful connection with Cognos Analytics.
While this tutorial focuses on one specific method of integration, it’s important to acknowledge that alternative methods may also work for achieving similar results. This blog aims to clarify the process and help you implement a Ping Federate OIDC connection, but it doesn’t imply that this is the only approach available for such integrations.
Overview
Technology Involved:
- Cognos Analytics 12.0.4 and 11.2.4 Fixpack 4
- Ping Federate Server 12.0.1
Prerequisites
1.Ping Federate Server 12.0.1: Working knowledge of Ping Federate Server
2. Cognos Analytics Server 12.0.2 and 11.2.4 Fixpack 4
Content Overview
The content below is divided into two parts. In the first part, we will focus on configuring the PingFederate provider, which is quite detailed and involves several key components necessary for seamless integration with Cognos Analytics. While you're welcome to explore alternative approaches based on your specific business requirements, the steps provided in this blog have been thoroughly tested in-house and have been proven to work successfully with Cognos Analytics.The second part of this blog with focus on configuring the Cognos Analytics server with Ping Federate provider configured on the first part.
A)Configuring Ping Federating Identity Provider
- Creating a Datastore Connection to an On-Premises Active Directory Domain
- Setting Up and Configuring the Password Validator
- Configuring the IdP Adapter for the Identity Provider
- Configuring the Authorization Server Settings
- Defining Scopes in PingFederate
- Configuring the IdP Adapter Mapping
- Setting Up Resource Owner Credentials Mapping
- Managing Certificates and Keys
- Configuring Access Token Management
- Configuring Access Token Mappings
- Setting Up the OpenID Connect Policy
- Creating the OAuth Client
B) Configuring Cognos Analytics with PingFederate
-
Downloading the PingFederate Certificate for Import into Cognos Analytics
- Obtain the necessary PingFederate certificate and ensure it is ready for integration.
-
Configuring the PingFederate Namespace in Cognos Analytics
- Set up the PingFederate namespace within Cognos, ensuring proper authentication and seamless integration between the two systems.
C)Integrating PingFederate with Cognos Analytics for Group Information Retrieval
Cognos Analytics does not automatically retrieve group information from the PingFederate provider by default. Instead, the application only displays the data contained within the id_token issued by PingFederate. Therefore, if group information is not visible in the cogserver.log during authentication, it will not appear in Cognos Analytics either. It is crucial that the PingFederate administrator carefully manages the user group mapping, ensuring that this mapping is included in the id_token and, more importantly, that group information is accessible outside of Cognos before it can be utilized within Cognos Analytics.
The steps in this guide demonstrate how group mapping can be performed by creating a datastore connection to a backend Active Directory, which retrieves user information into PingFederate. This setup involves creating multiple user attributes, with memberOf being the key attribute for obtaining user group information. While this method works in the current setup, it may vary across organizations based on business needs. In such cases, you will need to consult your PingFederate administrator to review how group information is configured and passed in both the id_token and access_token.
Detailed Configuration Steps
A) Configuring Ping Federating Identity Provider
1.Creating a Datastore Connection to an On-Premises Active Directory Domain
The first step is to create a Datastore connection in PingFederate to establish a link to an on-premises Active Directory. This connection is crucial for mapping users from Active Directory to the PingFederate provider, enabling authentication with Cognos Analytics. To begin, navigate to System and select Data & Credentials Stores. Click New Data Store, choose Directory (LDAP) as the type, and then click Next, as illustrated below.
Under LDAP Configuration provide the Hostname of the LDAP Server , the Bind User DN and Password and Test the connection