PingIntelligence

Configuring an OIDC application in PingOne for PingIntelligence Dashboard

Complete the following steps in PingOne to create and configure an OpenID Connect (OIDC) application for setting up single sign-on (SSO) to PingIntelligence for APIs Dashboard.

Steps

  1. From the PingOne dashboard, create a new connection.

  2. Provide the information for following fields:

    • Application Name

    • Description (Optional)

    • Icon (Optional)

  3. For Application Type, choose OIDC Web App, and click Save.

  4. On the Configuration tab, click the Pencil icon.

  5. Enter the following URL in the Redirect URLs field and click Save.

    The path in the URI is as follows: https://<pi_install_host>:8030/login/oauth2/code/PingIntelligence. Do not change the path in the URI, just substitute the hostname. For example, https://127.161.140.180:8030/login/oauth2/code/PingIntelligence.

  6. Click the Resources tab and then click the Pencil icon. Click the icon next to the profile scope to add to the list of Allowed Scopes. Click Save.

  7. Click the Attribute Mappings tab and click the Pencil icon. Add the following attributes and map them to the PingIntelligence Dashboard SSO.properties. Click Add to add additional attributes. Make sure to select the Required check box for each attribute. When you are finished, click Save.

    OIDC Attributes Value

    User ID

    PingOne User Attribute

    The value defaults to sub.

    Family Name

    PingOne User Attribute

    The value of this property should be a claim name that holds the last name of the signed-on user in <pi_installation_path>/pingidentity/webgui/sso.properties file. The default value for the claim is family_name. For more information, see Configuring SSO with PingOne.

    Given Name

    PingOne User Attribute

    The value of this property should be a claim name that holds the first name of the signed-on user in <pi_installation_path>/pingidentity/webgui/sso.properties file. The default value for the claim is given_name. For more information, see Configuring SSO with PingOne.

    Role

    Static Key

    The value of this property should be a claim name that holds the value of the role of the signed-on user in <pi_installation_path>/pingidentity/webgui/sso.properties file. For more information, see Configuring SSO with PingOne.

    The default value in Dashboard is role. Supported values for the Role claim are ADMIN and REGULAR.

  8. Click the Configuration tab and record the values for the following application properties to use in later steps in Configuring SSO with PingOne:

    • Issuer

    • Client ID

    • Client Secret

    A screenshot of the Configuration tab in PingOne.
  9. Click the Pencil icon on the top right, set the following properties, and click Save.

    Property Value

    Response Type

    Select Code.

    Grant Type

    Select Authorization Code. Keep the PKCE Enforcement as OPTIONAL.

    Token Endpoint Authentication Method

    Select None, Client Secret Basic, or Client Secret Post.

  10. To enable the application, click the toggle switch to the on (blue) position.

Next steps

Complete the SSO configuration in PingIntelligence for APIs Dashboard. For more information see, Configuring SSO with PingOne.