Skip to content

Deploying PingCentral

This use case employs the pingidentity-server-profiles/baseline/pingcentral server profile. This server profile contains a MySQL database engine located in pingidentity-server-profiles/baseline/pingcentral/external-mysql-db.

Before you begin

You must:

  • Complete Get Started to set up your DevOps environment and run a test deployment of the products.
  • Clone the repository:

    Choose from:

About the task

You will:

  • Deploy the stack.
  • Sign on to the management consoles.
  • Bring down or stop the stack.
  • Preserve the database.
  • Configure trust for PingCentral.
  • Configure single sign-on (SSO) for PingCentral.

Deploying the stack

Use the docker-compose.yaml file in your local pingidentity-devops-getting-started/11-docker-compose/30-pingcentral directory to deploy the cluster.

  1. Go to your local pingidentity-devops-getting-started/11-docker-compose/30-pingcentral directory and enter:

    docker-compose up -d
  2. To check that the containers are healthy and running, enter:

    docker-compose ps

    You can also display the startup logs:

    docker-compose logs -f

    To see the logs for a particular product container at any point, enter:

    docker-compose logs <product-container-name>
  3. Sign on to the management consoles:

    Product Connection Details
  4. Copy the MySQL database hostkey created on initial startup located in the container to your local /tmp directory.

You'll need the hostkey in a subsequent step.

  1. When you are in your /tmp directory, enter:

    docker cp pingcentral_container_name:/opt/out/instance/conf/pingcentral.jwk .
  2. When you no longer want to run this stack, you can either stop the running stack or bring the stack down.

    Choose from:

    • To stop the running stack without removing any of the containers or associated Docker networks, enter:

      docker-compose stop
    • To remove all of the containers and associated Docker networks, enter:

      docker-compose down

Preserving the database

To preserve any updates to the MySQL database, you must mount the ./conf/mysql/data directory to the /var/lib/mysql volume. You must also mount ./conf/pingcentral.jwk to /opt/server/conf/pingcentral.jwk to save the hostkey file created on initial startup of the PingCentral container.

Use the saved hostkey to access the database.

  1. If the stack is running, bring it down:

    docker-compose down
  2. Open the pingidentity-devops-getting-started/11-docker-compose/30-pingcentral/docker-compose.yml file and mount ./conf/mysql/data to the /var/lib/mysql volume under pingcentral-db. For example:

        image: mysql
        command: --default-authentication-plugin=mysql_native_password
          MYSQL_ROOT_PASSWORD: 2Federate
          - ./conf/mysql/data:/var/lib/mysql
          - "3306:3306"
          - pingnet

    Keep the docker-compose.yml file open.

  3. In the pingidentity-devops-getting-started/11-docker-compose/30-pingcentral/docker-compose.yml file, mount ./conf/pingcentral.jwk to the /opt/server/conf/pingcentral.jwk volume under the pingcentral service. For example:

        image: ${}/pingcentral:${PING_IDENTITY_DEVOPS_TAG:-edge}
        command: wait-for pingcentral-db:3306 -t 7200 -- start-server
          - SERVER_PROFILE_PATH=baseline/pingcentral/external-mysql-db
          - MYSQL_USER=root
          - MYSQL_PASSWORD=2Federate
          - ~/.pingidentity/config
          - ./conf/pingcentral.jwk:/opt/server/conf/pingcentral.jwk
          - "9022:9022"
          - "pingcentral-db"
          - pingnet
  4. If the /conf directory doesn't exist, create it. When it has been created, copy the hostkey pingcentral.jwk from the /tmp directory to the new /conf directory.

  5. Save docker-compose.yml and start the stack:

    docker-compose up -d
  6. Copy the hostkey pingcentral.jwk file you saved to your local /tmp to the /opt/out/instance/conf volume. Enter:

    docker cp /tmp/pingcentral.jwk:/opt/out/instance/conf

    The hostkey will now be persisted and available at each startup.

  7. If you encounter any permission issues, specify in the pingidentity-devops-getting-started/11-docker-compose/30-pingcentral/docker-compose.yml file to run as the root user:

        user: root

Configuring trust

By default, for the purposes of quick setup, the PingCentral container is insecure. This is because of the environment variable PING_CENTRAL_BLIND_TRUST=true setting in the docker-compose.yml file. By default, all certificates are trusted.

Caution: Remember to change this setting for production environments.

Setting PING_CENTRAL_BLIND_TRUST=false allows public certificates to be used only by your Ping Identity environments, such as PingFederate, unless you set up the trust store and configure PingCentral to use this trust store.

  1. To set up the trust in the container, first set PING_CENTRAL_BLIND_TRUST=false.
  2. Start up PingCentral and sign on.
  3. Click the Settings tab, and then click Trusted CA Certificates.
  4. Add trusted certificates to connect to your environments.

Configuring SSO

  • Enable SSO.

    Choose from:

    • Edit the properties file pingidentity-server-profiles/baseline/pingcentral/external-mysql-db/instance/conf/

      1. Update the pingidentity-server-profiles/baseline/pingcentral/external-mysql-db/instance/conf/ file according to the PingCentral documentation.

      2. Inject the file into the container using the volumes definition in the docker-compose.yml file to mount ./conf/ to the /opt/in/instance/conf/ volume under the pingcentral service of the docker-compose.yml file:

         - ./conf/
    • Use environment variables: To enable SSO using environment variables, add environment definitions for these environment variables:

    • For stacks, add the definitions to the docker-compose.yml file. For example:

            - pingcentral.sso.oidc.enabled=true
            - pingcentral.sso.oidc.issuer-uri=
            - pingcentral.sso.oidc.client-id=ac_oic_client_id
            - pingcentral.sso.oidc.client-secret=ClientSecretHere
            - pingcentral.sso.oidc.oauth-jwk-set-uri=
    • For standalone PingCentral containers:

      docker run --env pingcentral.sso.oidc.enabled=true \
        --env pingcentral.sso.oidc.issuer-uri= \
        --env pingcentral.sso.oidc.client-id=ac_oic_client_id \
        --env pingcentral.sso.oidc.client-secret=ClientSecretHere \
        --env pingcentral.sso.oidc.oauth-jwk-set-uri=

You might also need to edit the hosts file used by the container. For stacks, you can update the container's /etc/hosts file by adding extra_hosts definitions to the docker-compose.yml file. For example:

      - ""
      - ""