External IdP Configuration - PingOne OIDC
Add Application
- Application → Click + sign.
- Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC
- Enter Description.
- Click Application Type OIDC Web App
- Click the Save button.
Edit configuration
- Code, Token, and ID Token
- Select Authorization Code
- Select PKCE enforcement - S256_REQUIRED
Attribute Mappings
- Add the following custom attributes, which will be included in the response token.
- sub - User ID
- email - Email Address
- firstname - Given Name
- lastname - Family Name
Copy the Required values
- Please copy the following values and paste them temporarily into a notepad. These values will be used in the OpenMethods Experience Cloud SSO configuration page.
- Client ID
- Client Secret
- Environment ID
- Replace the Environment ID with the following URLs,, which will be used in the OpenMethods Experience Designer SSO configuration.
- Authorization Endpoint - https://auth.pingone.com/<Environment ID>/as/authorize
- Token Endpoint - https://auth.pingone.com/<EnvironmentID>/as/token
Assign Users
To allow users to access the Application
- It is recommended to create a new group and assign the users who will need the OpenMethods access and then assign the group to the Application.
- If no group is assigned to the Application then, be default, all the users will have access the Application.
- In the Overview page, Click Directory on the left side navigations section
- Click Groups
- Click + sign to add a new Group.
- Enter new Group Name - suggested Name is OM_ACCESS.
- Assign users to the Group.
- Click Users tab and Add Users by using Add Individually or Add with a Filter option.
- Open the Application and click the Access tab.
- Click the Edit icon.
- Select the Group from the group list.
Enable Application
- To enable the application to be used, click the radio button at the top right of the page, as highlighted in the image, to allow the application to be in use.
Related Articles
External IdP Configuration - PingOne SAML2
Add Application Click Applications from the left-side navigation section Click Applications + sign. Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC Enter Description. Click Application Type SAML Application Click the Configure ...
External IdP Configuration - ADFS OIDC
OpenMethods allows users to log in with a single sign-on (SSO) system using SAML 2.0. An identity provider (IDP) that supports SAML 2.0 can be set up in various ways, such as a self-hosted Active Directory Federation Services (ADFS) server. ADFS is a ...
External IdP Configuration - Okta OIDC
Create a new app integration. Go to Applications and click Create App Integration. On the Create a new app integration page: Select Sign-in method - OIDC - OpenID Connect Select Application Type - Web Application Click Next Enter the App Integration ...
External IdP Configuration - Azure AD OIDC/SAML2
Add Application Click the App Registration located under the Azure Services. Click New Registration Enter Name - The suggested name is OpenMethods-SSO Select the appropriate account types. Redirect URI Select Web Enter ...
External IdP Configuration - Auth0 OIDC/SAML2
Create Application Log in to Auth0 to Auth0 Dashboard. It is recommended to creating a new application which is specific OpenMethods use only. Click Create Application button Enter the desired Application name: For example: OpenMethods-SSO Select ...