Skip to main content

Ping Identity

This document covers configuring Ping Identity as an IdP for your Pomerium gateway. It assumes you have already installed Pomerium.


While we do our best to keep our documentation up to date, changes to third-party systems are outside our control. Refer to Adding an application - Web application from Ping's documentation as needed, or let us know if we need to re-visit this page.

Create OpenID Connect App

  1. To use the Ping Identity provider, first go to the Ping One console and select the environment you want to create the app for.

  2. Click Connections in the side menu, select Applications and click + button to create a new application:

    The Ping Applications Screen, highlighting the "New App" button.

  3. Select WEB APP, then OIDC:

    Ping Add Application

  4. Name the application and optionally provide a description and icon:

    Ping Create App Profile

  5. On the Configure page, add the Pomerium authenticate redirect URL. For example:

  6. Provide the necessary scopes to your application as needed for your policies from the scopes available in the OpenID Spec. Pomerium requires at least the email scope:

    Ping App Resource Grants

  7. OIDC Attributes. Save and Close.

  8. From the Configuration tab of your new application, note the values of the following keys to use in your Pomerium Configuration:

    • ISSUER: used as the idp_provider_url (e.g.
    • CLIENT ID: used as the idp_client_id
    • CLIENT SECRET: used as the idp_client_secret

    Ping Configuration

  9. Toggle the green slider to enable your new application.

Service Account

To use allowed_groups in a policy, an idp_service_account needs to be set in the Pomerium configuration. The service account for Ping uses a different application, and client ID and client secret from the one configured above.

  1. Click Add Application, but this time select Worker → Worker App.

    Ping Add Worker

  2. Toggle the green slider to enable your new application.

  3. This application's Client ID and Client Secret will be used as the service account in Pomerium.

    Ping Worker Configuration

    The format of the service account is a JSON encoded object with client_id and client_secret properties:

    "client_id": "XXXXXXXXXX",
    "client_secret": "XXXXXXXXXX"

    You can save the object as a temporary file to encode as a base64 value:

    cat tmp.json | base64 -w 0

Pomerium Configuration

Update your Pomerium configuration to use Ping as the IdP:

idp_provider: "ping"
idp_provider_url: ""
idp_client_id: "CLIENT_ID"
idp_client_secret: "CLIENT_SECRET"
idp_service_account: "XXXXXXX" # Base64-encoded JSON