Collections I'm working on - those of interest to the broader Ping Identity audience will be moved over to the Ping Repository
Those posted here are not all in a finished state - but could be used to start working with Ping Identity APIs.
Several of these are being used to Train \ Attack the API endpoints protected by PingIntelligence - they are designed to be self-contained in Postman Collection Runner iterations. Collections used in this way will have a "Training" and "Attack" Folder in them.
Note: These collections are using Dev-quality services - none of the data on them is real, nor should there be any expectation that the locations \ creds referenced in these collections will remain valid.
Also - Postman requires that you have created an account with them in order for the Scripts to run. You do not need Postman Pro - the free version will work, but you do need to be Registered.
This Collection is built to:
- Demonstrate the Consent API in PingDirectory
- Train PingIntelligence with appropriate calls
- Attack PingIntelligence with inappropriate calls
The "Training" folder contains calls that show correct usage of the API
Notes:
Consent Definitions need to be created in PingDirectory Admin Console first
Some calls contain hardcoded mapping of Definitions to Audience. If you want to use this against your own instance of Consent API, the array is held in Collection Variables
This set demonstrates the new APIs in PF 9.2+ that allow you to use the Admin API to fully build out a PingFed server that's connected to PingDirectory.
This set of calls:
- Accepts EULA
- Imports a PingFed license (stored in the Environment)
- Adds the intitial Admin user
- Enables the Server Roles
- Adds PingDirectory as a Data Store
- Adds a LDAP Password Credential Validator
- Adds a HTML Form Adapter with the PCV
- Adds an AuthN Policy with Contract
This collection is built to Train and Attack a PingDirectory SCIM API when protected with PingIntelligence.
The Training folder contains a set of calls that would be expected for a SCIM service - using a Cookie to represent the User Session for the call.
The Attack folder sends calls that are unexpected or malicious. Simulating calls that:
- Use a stolen cookie
- Attempt to probe different parameters
- Inject bad data into the object
- Exfiltrate data
This collection is designed to be placed into Postman Collection Runner (or Newman)