Skip to content

Configure SSO OIDC with Ping Identity for your organization

From version 1.41, Lightrun supports Single Sign-On (SSO) with OIDC (OpenID Connect protocol) using Ping Identity as your identity provider (IdP). Using OIDC, Lightrun functions as a service provider, receiving user authentication information from Ping Identity, which serves as the external identity provider. When SSO is enabled, Lightrun delegates authentication requests to the customer's IdP and grants users access to Lightrun in accordance with the IdPs response.

Once you have set up your SSO with OIDC, proceed to create your Lightrun users in the User Management page.

The process of setting up SSO involves these main stages:

  • Setting up the Lightrun-OIDC integration in Ping Identity.
  • Configuring and enabling SSO in the Lightrun Management Portal.

Set up the Lightrun OIDC integration in Ping Identity

Step 1: Get Lightrun’s Redirection URL

  1. Log in to your Lightrun Management Portal.
  2. Click Settings on the top right-hand side of menubar.
  3. Set OIDC as your SSO Protocol based on your version:

    • For version 1.54 and higher.
      1. Navigate to the Identity Configuration > Login Method tab.
      2. From the list, select Single Sign-On (SSO).
      3. Select OIDC as your SSO protocol.
    • For version 1.53 and earlier.
      1. Navigate to the Identity and Access Management > Identity Configuration > Provisioning.
      2. Click SSO toggle to enable SSO.
      3. Select OIDC as your SSO Protocol.
  4. From the Service Provider's Redirect URL field, click Copy.

    This serves as the redirect URL used when configuring the identity provider. Note that at this point, SSO is not enabled with OIDC in Lightrun and will be activated in the next steps.

Step 2: Set up Lightrun Application in Ping Entity

  1. Create a new application for Lightrun in Ping.

    Navigate to Connections > Applications and click the + (plus icon) to create the application.

  2. In the Redirect URIs field, paste the URL you copied from the Lightrun SSO settings.

  3. Click Edit.

    The Edit Configuration page opens.

  4. Click the Protocol OpenID Connect and validate that the Token Endpoint Authentication Method is set to Client Secret Post.

  5. Edit the custom attribute mapping:

    1. Click the Attribute Mappings tab.
    2. Go to the Custom Attributes section and click Add Attribute.
    3. Under Attributes set sub, for PingOne Mappings set Email Address and for Scopes set openid as displayed in the following image.

      custom attribute setup

  6. Click Save.

Step 3: Get Ping’s Identity Provider’s parameters

  1. In Ping Identity Management Portal, in the application, click the General tab and copy the values for the Client ID and Client Secret to be pasted in the Lightrun Management Portal.

    Lightrun application in Ping

  2. Proceed to click the Configuration tab and open the URLs tab.

    This page contains the relevant URLs that will need to be placed in the Lightrun Management Portal for the SSO configuration.

  3. Copy the OIDC Discovery Endpoint to the clipboard to be placed in the SSO page in the Lightrun Management Portal.

    Ping Configuration page

Proceed to configure the Lightrun OIDC settings in the Lightrun Management Portal.

Step 4: Set up SSO OIDC Ping in Lightrun

  1. Log in to the Lightrun Management Portal.
  2. Click Settings on the top right-hand side of menubar.
  3. Set OIDC as your SSO Protocol based on your version:

    • For version 1.54 and higher.
      1. Navigate to the Identity Configuration > Login Method tab.
      2. From the list, select Single Sign-On (SSO).
      3. Select OIDC as your SSO protocol.
    • For version 1.53 and earlier.
      1. Navigate to the Identity and Access Management > Identity Configuration > Provisioning.
      2. Click SSO toggle to enable SSO.
      3. Select OIDC as your SSO Protocol.
      4. Paste the following values that you copied from Ping Identity.
    • Identity Provider’s Discovery URL: The URL provided by the SSO Provider for discovery OpenID Connect configuration details.
    • Identity Provider's Client ID: The unique identifier assigned to Lightrun by Ping.
    • Identity Provider’s Client Secret: The secret key assigned to Lightrun by Ping for the OIDC authentication.
  4. Click Save.

Further reading


Last update: March 27, 2025