Skip to main content

Integrating Oloid tenant to your PingOne (OIDC) instance

Updated over a month ago

Introduction

This document provides step-by-step instructions on how Oloid's WebKey application integrates with PingOne as an external OpenID Connect (OIDC) Identity Provider (IdP).

  1. Sign in to the Ping Identity Administrator Console with your PingOne account credentials

  2. Select Create Environment, then select Create a Customer Solution.

  3. Go to the newly created environment and select Manage Environment.

  4. On the left menu panel, select Integrations > External IdPs.

    The Identity Providers page is displayed.

  5. Select +Add Provider.

  6. Select OpenID Connect under Custom.

  7. Do the following:

    1. Enter a unique name for the Identity Provider profile in the NAME field.

    2. Enter a description to help identify the purpose of this profile in the DESCRIPTION field.

    3. Click Continue.

      The Configure OpenID Connect Connection section is displayed.

    4. Enter ClientID and Client Secret provided by Oloid Admin.

    5. Enter OpenID Configuration Endpoint from Oloid Tenant Admin Portal in the Discovery Document URI field.

      Note: To find the OpenID Configuration Endpoint in the Oloid Tenant Admin Portal, go to Auth Policies > Identity Provider > select IDP Profile > Meta Data tab > OpenID Configuration Endpoint.

    6. Next, select Use Discovery Document.

      This auto-fills the remaining endpoints.

    7. Select Client Secret Post as TOKEN ENDPOINT AUTHENTICATION METHOD.

    8. Click Save and Continue.

      The Map Attributes section is displayed.

    9. Click +ADD ATTRIBUTE.

    10. Select Email Address from PINGONE USER PROFILE ATTRIBUTE dropdown list.

    11. Set providerAttributes.Email in OIDC ATTRIBUTE field.

    12. Select Empty Only from UPDATE CONDITION dropdown list.

    13. Select Save and Finish.

  8. Enable the newly created IDP from the External IdPs list.

  9. Go to the Connection tab, copy the CALLBACK URL, and paste it in the Oloid Tenant Admin Portal in Callback URL field.

    Note: To find the Callback URL field in the Oloid Tenant Admin Portal, go to Auth Policies > Identity Provider > select IDP Profile > IDP Settings tab > Callback URL.

  10. Update the Authentication Policies to use the new IDP.

    1. On the left navigation menu panel, go to Authentication > Policies > Authentication.

      The Authentication Policies page is displayed.

    2. Select +Add Policy to create a new authentication policy.

      The Policy page is displayed.

    3. Enter policy name in the POLICY NAME field.

    4. Under STEP TYPE, select External Identity Provider from dropdown.

      The EXTERNAL IDENTITY PROVIDER section is displayed.

    5. Select the created external identity provider from the EXTERNAL IDENTITY PROVIDER section.

    6. Click Save.

      The policy is created successfully.

  11. Next, go to the left menu navigation panel and select Applications > Applications.

  12. On the Application page, select PingOne Application Portal > copy the Home Page URL.

  13. Select Applications from the left menu, and click the Add icon to add a new application.

    The add application page is displayed.

  14. Do the following:

    1. Enter Application Name, then select OIDC Web App from Application Type.

    2. Click Save.

    The application is created successfully.

  15. Select the newly created application from the application list to edit.

  16. On the application Profile page, enable the app using the toggle button next to the application name.

  17. Paste the copied URL in the Configuration tab > Redirect URL field of the created application.

    Note: Create an application.

  18. In the Oloid Tenant Admin Portal, go to IDP Settings > Redirect URL and paste the same Home Page URL in the Redirect URL field.

    Note: Ensure that the Redirect URL in both PingOne and the Oloid Tenant Admin Portal match exactly to enable successful authentication.

  19. Select the created application.

    The application details page is displayed.

  20. Go to Resources > edit ALLOWED SCOPES.

  21. Select email, and then click Save.

  22. Then, go to Access and edit > add groups > click Save.

  23. Under Policies tab, click +Add Policies.

  24. Select the created policy, then click Save.

  25. Under Access tab, click the editicon.

  26. Select the created group, then click Save.

    Note: To create a group, go to Directory > Groups.

Related Document


​

Did this answer your question?