External IdP Configuration - PingOne OIDC

External IdP Configuration - PingOne OIDC

 

Add Application

  • Application → Click + sign.
  • Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC
  • Enter Description.
  • Click Application Type OIDC Web App 
  • Click the Save button.

 

Edit configuration

  • Select Response Type
  • Code, Token, and ID Token
  • Grant Type
  • Select Authorization Code
  • Select PKCE enforcement - S256_REQUIRED

Attribute Mappings

  • Add the following custom attributes, which will be included in the response token.
  • sub - User ID
  • email - Email Address
  • firstname - Given Name
  • lastname - Family Name

Copy the Required values

  • Please copy the following values and paste them temporarily into a notepad. These values will be used in the OpenMethods Experience Cloud SSO configuration page.
  • Client ID
  • Client Secret
  • Environment ID

  • Replace the Environment ID with the following URLs,, which will be used in the OpenMethods Experience Designer SSO configuration.
  • Authorization Endpoint - https://auth.pingone.com/<Environment ID>/as/authorize
  • Token Endpoint - https://auth.pingone.com/<EnvironmentID>/as/token

Assign Users

To allow users to access the Application

  • It is recommended to create a new group and assign the users who will need the OpenMethods access and then assign the group to the Application.
  • If no group is assigned to the Application then, be default, all the users will have access the Application.

 

 

  • In the Overview page, Click Directory on the left side navigations section
  • Click Groups
  • Click + sign to add a new Group.
  • Enter new Group Name - suggested Name is OM_ACCESS.
  • Assign users to the Group.

  • Click Users tab and Add Users by using Add Individually or Add with a Filter option.

  • Open the Application and click the Access tab.
  • Click the Edit icon.
  • Select the Group from the group list.

Enable Application

  • To enable the application to be used, click the radio button at the top right of the page, as highlighted in the image, to allow the application to be in use.


    • Related Articles

    • External IdP Configuration - PingOne SAML2

      Add Application Click Applications from the left-side navigation section Click Applications + sign. Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC Enter Description. Click Application Type SAML Application Click the Configure ...
    • External IdP Configuration - ADFS OIDC

      OpenMethods allows users to log in with a single sign-on (SSO) system using SAML 2.0. An identity provider (IDP) that supports SAML 2.0 can be set up in various ways, such as a self-hosted Active Directory Federation Services (ADFS) server. ADFS is a ...
    • External IdP Configuration - Okta OIDC

      Create a new app integration. Go to Applications and click Create App Integration. On the Create a new app integration page: Select Sign-in method - OIDC - OpenID Connect Select Application Type - Web Application Click Next Enter the App Integration ...
    • External IdP Configuration - Azure AD OIDC/SAML2

      Add Application Click the App Registration located under the Azure Services. Click New Registration Enter Name - The suggested name is OpenMethods-SSO Select the appropriate account types. Redirect URI Select Web Enter ...
    • External IdP Configuration - Auth0 OIDC/SAML2

      Create Application Log in to Auth0 to Auth0 Dashboard. It is recommended to creating a new application which is specific OpenMethods use only. Click Create Application button Enter the desired Application name: For example: OpenMethods-SSO Select ...