For information about application types, see Applications in the PingOne documentation.
  1. On the PingOne MFA console, go to Connections > Applications.
  2. Click the + icon.
  3. Create the application profile by entering the following:
    • Application name: A unique identifier for the application.
    • Description (optional): A brief characterization of the application.
    • Icon (optional): A graphic representation of the application. Use a file up to 1MB in JPG, JPEG, GIF, or PNG format.
  4. Select OIDC for the Application Type.
    OIDC applications have the following abilities:
    OIDC apps
    • Authentication methods:
      • SMS
      • Email
      • Third-party authentication apps
      • Push notifications
    • Device integrity checks to prevent users from pairing or authenticating with compromised devices.
    • Client Initiated Backchannel Authentication (CIBA) support.
  5. Click Save.
  6. Click the Configuration tab, then click the Pencil icon.
  7. Click to expand the General section.
  8. Note the application credentials.
    You'll use these in Configuring an adapter instance.
  9. In the Response Type section, select only Token and ID Token.
  10. In the Grant Type section, select only Implicit. Click Save. Close the Application Details pane.
  11. In the Redirect URLs field, enter any value, such as https://www.example.com. Click Save.
    Redirect URLs are not relevant for this integration.
  12. Click the Resources tab, then click the Pencil icon.
  13. Click and drag scopes in the left column to add them to the Added Scopes column on the right. Click Save.
    Scopes are not relevant for this integration.
  14. Click the Attribute Mappings tab, then click the Pencil icon.
  15. Map user attributes to attributes in your application. Click Save.
  16. If you created an OIDC application for mobile device or CIBA authentication, enter your Android and iOS configuration details.
    1. Click the Authenticator tab, then click the Pencil icon.
    2. Click Add for your mobile app type.
    3. Enter your app details.

      For help, see the following sections of the Ping Identity GitHub site:

    4. Optional: Turn on the Device Integrity Check.
      A screen capture that shows the Device Integrity Check setting.

      For more information, see Authentication method management.

    5. Click Save.
  17. Go to Connections > Applications, and click the toggle to turn on the application.