Cloudflare Docs
Cloudflare Zero Trust
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)

PingOne®

The PingOne® cloud platform from PingIdentity provides SSO identity management. Cloudflare Access supports PingOne as an OIDC identity provider.

​​ Set up PingOne as an OIDC provider

  1. In your PingIdentity environment, go to Connections > Applications.
  2. Select Add Application.
  3. Enter an Application Name.
  4. Select OIDC Web App and then Save.
  5. Select Resource Access and add the email and profile scopes.
  6. In the Configuration tab, select General.
  7. Copy the Client ID, Client Secret, and Environment ID to a safe place. These ids will be used in a later step to add PingOne to Zero Trust.
  8. In the Configuration tab, select the pencil icon.
  9. In the Redirect URIs field, enter your team domain and select Save.
  10. In Zero Trust, go to Settings > Authentication.
  11. Under Login methods, select Add new.
  12. Select PingOne.
  13. Input the Client ID, Client Secret, and Environment ID generated previously.
  14. (Optional) Enable Proof of Key Exchange (PKCE). PKCE will be performed on all login attempts.
  15. (Optional) Under Optional configurations, enter custom OIDC claims that you wish to add to your Access application token.
  16. Select Save.

You can now test your connection and create Access policies based on the configured login method.

​​ Example API configuration


{
"config": {
"client_id": "<your client id>",
"client_secret": "<your client secret>",
"ping_env_id": "<your ping environment id>"
},
"type": "ping",
"name": "my example idp"
}