Ensure that you have copied the values for client ID and client secret from GitHub.

  1. Return to GitHub.
  2. In the OAuth Apps section, select the appropriate application.
  3. Locate the Client ID and Client Secret, and copy the values to a secure location.
  4. In PingOne, on the Configure Connection page, enter the following values:
    • Client ID: The application identifier that you copied from the IdP. You can find this information on GitHub.
    • Client Secret: The application secret that you copied from the IdP. You can find this information on GitHub.
  5. Click Save and Continue.
  6. On the Map Attributes page, define how the PingOne user attributes are mapped to identity provider attributes. For more information, see Mapping attributes.
    • Enter the PingOne user profile attribute and the external IdP attribute. For more information about attribute syntax, see Identity provider attributes.
    • To add an attribute, click + Add attribute.
    • To use the expression builder, click Build and test or Advanced Expression. See Using the expression builder.
    • Select the update condition, which determines how PingOne updates its user directory with the values from the identity provider. The options are:
      • Empty only: Update the PingOne attribute only if the existing attribute is empty.
      • Always: Always update the PingOne directory attribute.

      You can map the following attributes provided by GitHub.

      • Avatar URL
      • Blog
      • Company
      • Email
      • HTML URL
      • User ID
      • Location
      • Login
      • Name
      • Node ID
      • Site Admin
      • Type
      • URL
  7. Click Save and Finish.