The HYPR Intelligent Extension for PingFederate, jointly built by HYPR and ProofID, utilizes PingFederate as an Identity Provider (IdP), which enables users to register devices and authenticate using password or biometric credentials. Within the Intelligent Extension, the HYPR IdP Adapter serves as a platform to register a biometric device after a user has been successfully authenticated via a password credential validator. After registering a device, a user can log in to the specified Service Provider (SP) using password or biometric credentials.
This HYPR Intelligent Extension for PingFederate is designed and supported for HYPR Command Center and compliant with the PingFederate SSO IdP Server. The HYPR Integration Kit is compliant with PingFederate v7.x and above releases. Refer to PingFederate documentation for the specific system requirements for the specific version of PingFederate being integrated as the target hosting platform for the HYPR Intelligent Extension.
The HYPR Intelligent Extension for PingFederate uses information from the PingFederate v8.3.1 Administration Console. Configuration information will vary slightly between versions of PingFederate; however, the HYPR IdP Adapter configuration will be the same.
Contact HYPR support to acquire the HYPR Client SDK (java-client-xxx.jar) JAR files.
The distribution ZIP file for the HYPR Intelligent Extension contains the following items: • /legal – Contains legal documents
- Legal.pdf – Copyright and license information
- License_Agreement.pdf – Click-through agreement
• /docs – Contains the documentation needed to setup and use the HYPR IdP Adapter
- HYPR-Integration-Kit-ReleaseNotes.pdf – Release notes
- HYPR-Integration-Kit-UserGuide.pdf – This document
• /dist – Contains the libraries needed to implement the HYPR IdP Adapter
- pf.adapters.hypradapter.jar – HYPR IdP Adapter plug-in for PingFederate
• /dist/conf/language-packs – Contains the language support packs for user interfaces
- HYPR-messages.properties – English translation for out-of-the-box user templates
- HYPR-messages_es.properties – Spanish translation for out-of-the-box user templates • /dist/conf/template – Contains the velocity templates needed for user interfaces
- hypr.form.login.template.html – Login template
- hypr.form.register.template.html – Device registration template
• /dist/conf/template/assets/css – Contains the HYPR style sheet for velocity templates
- hypr.css – HYPR style sheet for velocity templates
- User attempts to access a protected web resource.
- User is redirected to PingFederate to authenticate.
- User enters Username to the PingFederate login page.
- HYPR IdP Adapter initiates authentication with the HYPR server.
- User uses biometric authentication to verify identity.
- HYPR mobile application sends authentication success response to server.
- HYPR server sends authentication success to PingFederate.
- PingFederate creates user login session.
- User is redirected to the protected web resource.
Integrating the HYPR IdP Adapter into a PingFederate server involves the following steps:
• Installing the HYPR IdP Adapter libraries, language packs, and templates onto a PingFederate server
• Configuring the HYPR IdP Adapter based on a specific use case
Perform the following steps to install the HYPR IdP Adapter:
Log in as an administrator to the PingFederate server.
Stop the PingFederate server if it is running.
From the integration kit dist directory, copy the jar files and paste them into the specified PingFederate directory. Also copy the HYPR Client SDK JAR files to the same directory.
From the integration kit dist directory, copy the configuration files for language packs and templates, and paste them into the specified PingFederate directory. These files do not replace existing PingFederate configuration files; rather, they are used in addition to existing configuration files.
Start the PingFederate server.
Perform the following steps to configure PingFederate with the HYPR IdP Adapter:
- Open a web browser and log in to the PingFederate Administration Console.
- Within the console, select Adapters under IdP Configuration on the Main Menu.
(For more information about IdP Adapters, see the PingFederate Administrator’s Manual.)
- On the Manage IdP Adapter Instances screen, click [Create New Instance].
- On the Type screen, enter the following values:
Instance Name: Choose any name for identifying the adapter instance
Instance ID: Internal PingFederate ID that cannot contain spaces or non-alphanumeric characters Type: HYPR Adapter 1.0
- At the bottom of the Type screen, click [Next].
- On the IdP Adapter screen, click Add a new row to ‘Password Credential Validators’. Select a password credential validator instance. Click Update.
(For information about how to setup a password credential validator, see the PingFederate
- On the IdP Adapter screen, click Add a new row to ‘Common Names for SP Entity IDs’. Select an SP entity ID. Provide an Application Name. Click Update.
(For information about how to setup an SP connection, see the PingFederate Administrator’s Manual.)
- On the IdP Adapter screen, provide entries for each of the fields shown in the Table below.
HYPR Base URL
The base URL for the HYPR API.
The ID used to identify this application to the HYPR API.
The name of the application.
HYPR Application Key (Long) Provided By HYPR
The application key located on the HYPR Dashboard under Keys.
HYPR Application Secret Key
The HYPR application secret key located on the HYPR Dashboard.
Username Cookie Duration
The number of days the username cookie will remain active. A negative value indicates that the cookie will persist until the browser is shutdown.
User ID Field Name
The field name for the user ID that is returned from the preceding IdP adapter in a Composite Adapter that is used for user authentication. Examples include ‘username’ from an HTML Form Adapter or ‘subject’ from an OpenToken Adapter.
HYPR Login Template
The HTML template (in
HYPR Registration Template
The HTML template (in
Adapter Integration Error Template
The HTML template (in
- At the bottom of the IdP Adapter screen, click [Next].
- On the Extended Contract screen, add any desired contract extensions, then click [Next].
- On the Adapter Attributes screen, select
usernameas the Pseudonym, then click [Next].
- On the Adapter Contract Mapping screen, configure any desired adapter contracts, then click [Next].
- On the Summary screen, verify that the information is correct, then click [Done].
- On the Manage IdP Adapter Instances screen, click [Save] to complete the adapter configuration.
Updated about a year ago