Back in September I blogged about a new great partnership of Azure AD and PingAccess, in order to support new kinds of 0n-premises applications. You can take a look at blog post here: https://spanougakis.wordpress.com/2016/09/14/azuread-and-pingaccess-a-new-great-partnership-for-secure-web-app-access/
Starting from March 22nd, the Azure AD team is happy to announce that PingAccess for Azure AD is being deployed across Azure Datacenters around the world. As they say, it should be available by the end of Friday, 24/3/2017.
But what you can do with PingAccess for Azure AD? Many customers today host on-premises applications and they would like to get a simple, secure and cost-effective access to these applications, even with a single sign-on (SSO) experience. The easiest way to achieve these results is to use Azure AD Application Proxy (you can read more and see my presenation here: https://spanougakis.wordpress.com/2016/11/16/microsoft-live-webinar-azuread-application-proxy/)
But the customers need more: they have consistently asked for Application Proxy to also support apps that use headers for authentication, such as Peoplesoft, Netweaver Portal, and WebCenter. To enable this capability for our Azure AD Premium customers, Microsoft partnered with Ping Identity. Ping Identity’s PingAccess now allows Application Proxy to support apps that use header-based authentication.
PingAccess is installed on-premises. For apps that use header-based authentication, Application Proxy connectors route traffic through PingAccess.
PingAccess is a separately licensed feature, but your Azure Premium licenses now include a free license to configure up to 20 applications with this flow. If you have more apps, you’ll need to get a license through Ping Identity.
Do you want to test it? If so, this is what you need to do:
- Configure Application Proxy Connectors
- Create an Azure AD Application Proxy Application
- Download & Configure PingAccess
- Configure Applications in PingAccess
It’s always a good idea to go through the documentation that can be found here: https://docs.microsoft.com/en-us/azure/active-directory/application-proxy-ping-access