Skip to main content
All CollectionsOloid Platform - Enterprise FeaturesCreate and Mange IDP Provider
Integrating Oloid tenant to your PingOne (OIDC) instance
Integrating Oloid tenant to your PingOne (OIDC) instance
Updated over a week ago

Introduction

This document provides step-by-step instructions on how Oloid integrates with PingOne as an external OpenID Connect (OIDC) Identity Provider (IdP).

  1. Sign in to the Ping Identity Administrator Console with your PingOne account credentials

  2. Select Create Environment, then select Create a Customer Solution.

  3. Go to the newly created environment and select Manage Environment.

  4. On the left menu panel, select Integrations > External IdPs.

    The Identity Providers page is displayed.

  5. Select +Add Provider.

  6. Select OpenID Connect under Custom.

  7. Do the following:

    1. Enter a unique name for the Identity Provider profile in the NAME field.

    2. Enter a description to help identify the purpose of this profile in the DESCRIPTION field.

    3. Click Continue.

      The Configure OpenID Connect Connection section is displayed.

    4. Enter ClientID and Client Secret provided by Oloid Admin.

    5. Enter OpenID Configuration Endpoint from Oloid Portal in the Discovery Document URI field.

      To find the OpenID Configuration Endpoint in the Oloid Portal, go to Auth Policies > Identity Provider > select IDP Profile > Meta Data tab > OpenID Configuration Endpoint.

    6. Next, select Use Discovery Document.

      This auto-fills the remaining endpoints.

    7. Select Client Secret Post as TOKEN ENDPOINT AUTHENTICATION METHOD.

    8. Click Save and Continue.

      The Map Attributes section is displayed.

    9. Click +ADD ATTRIBUTE.

    10. Select Email Address from PINGONE USER PROFILE ATTRIBUTE dropdown list.

    11. Set providerAttributes.Email in OIDC ATTRIBUTE field.

    12. Select Empty Only from UPDATE CONDITION dropdown list.

    13. Select Save and Finish.

  8. Enable the newly created IDP from the External IdPs list.

  9. Go to the Connection tab and share the CALLBACK URL with Oloid Admin.

  10. Update the Authentication Policies to use the new IDP.

    1. On the left navigation menu panel, go to Authentication > Policies > Authentication.

      The Authentication Policies page is displayed.

    2. Edit Default Authentication policy.

    3. Select Enable Registration, then select Default from the POPULATION dropdown list.

    4. Select +Add Provider, then select new IdP from the provider list.

    5. Click Save.

  11. Next, go to the left menu navigation panel and select Applications > Applications.

  12. On the Application page, select PingOne Application Portal.

    The detailed section is displayed.

  13. Copy the Home Page URL from the General section of the PingOne Application Portal, and paste it into a new browser tab to authenticate using Oloid app.


    ​

Did this answer your question?