Configuring Coginiti Team for Ping Identity OAuth

Team

Prerequisites

  • Admin access to your Ping Identity Account.
  • Admin access to your Coginiti Team/Enterprise.

Ping Identity Configuration

  1. Log in to your Ping Identity account

    Log into your Ping Identity account as an admin.

  2. Create a new Ping Identity application

    Navigate to Applications -> Add Application -> OAuth/OpenID Connect. Fill in the form as follows:

    • Name: {Coginiti Team}
    • Description: Optional, can be used to describe the application's purpose.
    • Category: Optional, can be used to categorize the application.

    Click "Next" to proceed.

  3. Configure Ping Identity application

    On the "OAuth/OpenID Connect Settings" page:

    • Grant Types: Check "Authorization Code"
    • Response Types: Check "Code"
    • Redirect URIs: {https://coginiti-hostname}:443/api/auth/authorization-code/callback
    • Post Logout Redirect URIs: {https://coginiti-hostname}:443

    Click "Next" to proceed to the next step and then "Save & Publish" to finish the application setup.

  4. Retrieve Client ID and Secret

    Navigate to the newly created application's page, and note the "Client ID" and "Client Secret".

Coginiti Configuration

  1. Set up Ping Identity as IdP in Coginiti

    Log into Coginiti Team/Enterprise as an admin and navigate to the IdP configuration section. Fill in the form with the following details:

    • IdP provider: Ping Identity
    • Login URL: https://{your-ping-identity-domain}/as/authorization.oauth2
    • Client Id: The Client ID obtained from Ping Identity
    • Secret: The Client Secret obtained from Ping Identity
    • Coginiti host: {https://your-hostname}:443
    • Scopes: openid profile email
    • Exchange code URL: https://{your-ping-identity-domain}/as/token.oauth2
    • User information URL: https://{your-ping-identity-domain}/idp/userinfo.openid

    Click "Save" to finalize the IdP configuration.

Security Note

Never expose your Ping Identity Client Secret in your client-side code or push it to a public repository. Always keep it safe on your server.

Conclusion

This guide provides steps to set up Ping Identity as an OAuth 2.0 IdP for Coginiti Team/Enterprise. Be sure to replace placeholders with your actual details. For more information, please refer to Ping Identity's and Coginiti's official documentation.

Further Reading

For more in-depth information, please refer to the official Ping Identity documentation

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request