Configuring a token credentials authentication service
After you create a token credentials authentication service, configure it so that Pega Platform uses the specified token provider for authenticating users. Select this type of service for offline mobile applications. You can map claims from the token to properties in Pega Platform, and configure optional features such as preauthentication and postauthentication activities.
Before you begin: You must complete the following task before you can configure a
token credentials authentication service: Creating an authentication service
- Derive the operator ID directly from the token that is acquired from the identity provider. Avoid using excessively complex logic for deriving the operator ID.
- To lessen the possibility of phishing attacks, do not update sensitive operator information such as mobile phone number or email address in the preauthentication and postauthentication activities.
- Do not initiate operator provisioning in the postauthentication activity.
- Deploy the authentication service over a secure channel (HTTPS enabled).
To configure a token credentials authentication service, do the following steps.