SSO With Ping Identity (OIDC)
Last modified on September 3, 2024
Overview
This guide describes how to set up Ping Identity single sign-on (SSO) to manage authentication for StrongDM. After setup is complete, users logging in to StrongDM will be redirected to Ping Identity to perform the login.
StrongDM’s SSO integration has been tested and is officially supported with PingFederate, a product within the Ping Identity suite. Although it may also work with other Ping Identity products, these configurations have not been formally tested and are not officially supported at this time.
Prerequisites
To get started, make sure the following conditions are met:
- In Ping Identity, you must have elevated privileges or be an administrator with the ability to manage application settings.
- In StrongDM, your permission level must be set to Administrator.
Steps
We recommend that you keep both Ping Identity and the Admin UI open in your browser so you can easily tab between them.
Create the Ping Identity app
Please note that the following is a general guideline, and your app creation steps in Ping Identity may differ. For information about Ping Identity app configuration, please see the Ping Identity documentation.
- In the PingFederate administrative console, create an OpenID Connect (OIDC) application.
- Note the values for the client ID and client secret, as you need them when setting up the integration in StrongDM.
- Copy the app’s Ping Identity domain (for example,
https://pingfederate.organization-name.us2.ping.cloud
), which is the single sign-on URL in the next step. - Ensure that each user who should use StrongDM is assigned access to your app.
Configure StrongDM
- Log in to the StrongDM Admin UI.
- Go to Settings > User Management. Click the lock icon to make changes, and then enter your Ping Identity app details in the Single Sign-on section.
- For Provider, select Ping Identity (OIDC).
- For Single sign-on URL, enter your Issuer URL (for example,
https://pingfederate.organization-name.us2.ping.cloud
). - For Client ID, paste your client ID.
- For Client Secret, paste your client secret.
- Select your desired general SSO settings and click Save.
Configuration is now complete.