Introduction
This document explains how to configure an OIDC PingOne Identity Provider (IDP) profile in the Tenant Admin Portal.
Prerequisites
You must have access to the Tenant Admin Portal.
IDP profile must be created in Tenant Admin Portal. For further details, see How to create IDP Profile for PingOne
Ensure that the Webkey application is created. To create Webkey application, refer How to create and configure WebKey Application in Tenant Admin Portal | Oloid Help Center.
Steps to Configure OIDC-PingOne IDP Profile
Log in to the Oloid Tenant Admin Portal.
On the Applications page, click Auth Policies > Identity Provider.
The Identity Provider Profiles page is displayed.
Click the PingOne-IDP application.
The application details page is displayed.
Do the following:
The IDP Profile is configured.
Configure Details tab
The Details tab is used to view and manage the basic information such as IDP Name, IDP Description, etc. for the identity provider configured in the Tenant Admin Portal.
To configure the Details tab, do the following:
Edit the IDP Name. (Optional)
Enter Description. (Optional)
Do one of the following:
Select the required WebKey application from the Select WebKey Application dropdown list.
(OR)
Click Make Default.
Note: The Make Default button is enabled only when more than one IDP is added in the Tenant Admin Portal.
The Set this as Default IDP pop-up box is displayed.
Select the Webkey Application.
Select Set as Default.
The WebKey application is set as the default, and the application is linked to this IDP.
Click Save.
Note: If another IDP is currently set as default, it will be replaced upon confirmation.
To make IDP as default, click Make Default. The confirmation pop-up box is displayed.
Click Set as Default to designate the preferred IDP as default.
Details tab is configured successfully.
Configure Oloid Metadata Tab
The Metadata tab is used to provide the required information to configure PingOne settings and enable PingOne based authentication between the identity provider and the Tenant Admin Portal.
Click Oloid Metadata tab.
The Oloid Metadata tab is displayed.
Click Visit help page for the document to configure PingOne settings for SSO login.
Do the following:
Download Certificate: Download the certificate and upload it to the IDP Signature Certificate field.
OpenID Configuration Endpoint: Copy the OpenID Configuration Endpoint URL and enter it in the Discovery Endpoint URL field in the PingOne Admin Console.
Note: You can find the Discovery Endpoint URL field in the PingOne Admin Console. For details, click here.
Configure IDP Settings Tab
The IDP Settings tab is used to configure and upload the required PingOne details to enable authentication between the identity provider and Tenant Admin Portal.
To configure the IDP settings tab, do the following:
Click the IDP Settings tab.
The IDP Settings page is displayed.
Do the following to configure the IDP Settings tab.
Enter IDP ID.
You can find the IDP ID from PingOne Admin Console under Integrations > External IdPs > select your configured IDP.
Enter Callback URL.
You can find the Callback URL from PingOne Admin Console under Integrations > External IdPs > select your configured IDP > Connection tab > CALLBACK URL.
Enter Redirect URL.
You can find the Redirect URL from PingOne Admin Console under Applications > Applications > PingOne Application Portal > Configuration tab > General section.
Note: If you're using a custom domain, contact Professional Services for assistance.
Enter Application Client ID.
Enter Authorize URL.
Enter Secret.
You can find the Application Client ID, Authorize URL and Secret from PingOne Admin Console Applications > Applications > PingOne Application Portal > Overview tab.
Enter Home URL: Redirect URL to go back to home page.
Enter Home Button Label: This text will show up as button Label for Home URL.
Click Save.
The IDP Profile is configured successfully.
Configure Claims Tab
The Claims tab is used to configure custom claims that pass user attributes from Oloid to the OIDC provider.
Do the following:
Add Custom Claims
Custom Claims allow the admin to map Oloid user attributes to OIDC attributes.
Do the following:
In the Custom Claims section, click Add Field.
In the OIDC Attribute field, enter the attribute name expected by the OIDC provider.
In the Oloid Value dropdown, select the corresponding Oloid attribute (for example, Oloid ID).
Note: Click Add Field to add additional claim items.
Click Save.
The Custom claims are configured.
Authentication Methods References (AMR) Claims
AMR Claims indicate how a user was authenticated during the login process.
In the AMR Claims section enter the authentication method value.
Click Add to include the value.
Note: Click Add to add additional AMR claim items.
Click Save.
The PingOne IDP is successfully configured.
Keywords
| OIDC PingOne IDP | PingOne Integration | WebKey IDP configuration for PingOne |β















