PingOne

Creating a web or native OIDC application in PingOne

Create an application in PingOne to allow PingFederate to access PingOne authentication flows and policy decisions. This application represents the user-facing sign-on experience.

About this task

You can find more information about application types in Applications in the PingOne documentation.

Steps

  1. On the PingOne MFA console, go to Applications > Applications and click the icon.

  2. Create the application profile by entering the following:

    Application name

    A unique identifier for the application.

    Description (optional)

    A brief characterization of the application.

    Icon (optional)

    A graphic representation of the application. Use a file up to 1MB in JPG, JPEG, GIF, or PNG format.

  3. In the Application Type section, select Native or OIDC Web App, then click Save.

    If you will be Creating a CIBA authentication policy in PingOne, make sure to select Native.

    OIDC applications support the following authentication methods:

    • SMS

    • Email

    • Third-party authentication apps

    • Push notifications

    Native OIDC applications provide the following:

    • Device integrity checks to prevent users from pairing or authenticating with compromised devices.

    • Client Initiated Backchannel Authentication (CIBA) support.

  4. On the Configuration tab, in the General section, note the application credentials.

    You’ll use these in Configuring an adapter instance.

  5. On the Configuration tab, click the Pencil icon and enter the following information:

    1. In the Response Type section, select only Token and ID Token.

    2. In the Grant Type section, select only Implicit.

    3. Click Save.

  6. On the Resources tab, click the Pencil icon and configure the following:

    1. Select the checkboxes next to the scopes that you want to use to add them to the Selected Scopes tab, then click Save.

      Scopes are not relevant for this integration.

  7. Click the Attribute Mappings tab, then click the Pencil icon and configure the following:

    1. Map user attributes to attributes in your application, then click Save.

  8. If you’re creating a native OIDC application for mobile device or CIBA authentication, enter your Android and iOS configuration details:

    1. On the Mobile tab, click the Pencil icon.

    2. Click Configure for Android and enter your app details.

      You can find help in the following section of the Ping Identity GitHub site:

    3. Click Configure for iOS and enter your app details.

      You can find help in the following section of the Ping Identity GitHub site:

    4. (Optional) Turn on the Device Integrity Check.

      A screen capture that shows the Device Integrity Check setting.

      Learn more in Device Integrity Checks.

    5. Click Save.

  9. Click the toggle at the top of the application to activate it.