How To Integrate Ping Identity SSO with Chainguard

Procedural tutorial on how to create a Ping Identity Application

The Chainguard platform supports Single sign-on (SSO) authentication for users. By default, users can log in with GitHub, GitLab and Google, but SSO support allows users to bring their own identity provider for authentication.

This guide outlines how to create a Ping Identity Application and integrate it with Chainguard. After completing this guide, you’ll be able to log in to Chainguard using Ping and will no longer be limited to the default SSO options.


To complete this guide, you will need the following.

  • chainctl installed on your system. Follow our guide on How To Install chainctl if you don’t already have this installed.
  • A Ping Identity account over which you have administrative access.

Create a Ping Identity Application

To integrate the Ping identity provider with the Chainguard platform, sign on to Ping Identity and navigate to the Dashboard. Click on the Connections tab in the lefthand sidebar menu, and then click on Applications in the resulting dropdown menu. From the Applications landing page, click the plus sign () to set up a new application.

Screenshot of the Ping Identity Dashboard, showing the applications landing page. The Applications tab in the lefthand sidebar and the “add application” plus sign icon are circled in magenta.

Configure the application as follows:

  • Application Name: Set a name and option description (such as “Chainguard”) to ensure users recognize this application is for authentication to the Chainguard platform.
  • Icon: You can optionally add a Chainguard logo icon here to help your users visually identify this integration. If you’d like, you can use the icon from the Chainguard Console.
  • Application Type: Select OIDC Web App.

Screenshot showing the Add Application modal window with the following settings in place: Application Name is set to “Chainguard”; Description reads “Build it right, Build it safe, Build it fast,”; the example Inky icon has been uploaded to the Icon field; and the Application Type is set to “OIDC Web App.”

After setting these details, click the Save button.

Next, configure scopes for the application. In the Overview tab, click the Resource Access scope button.

Screenshot of the Overview tab, with the Resource Access scope button highlighted in a magenta circle.

Add email and profile scopes, then save.

Screenshot of the Edit Resources modal window, showing the email and profile scopes selected.

Next, configure the OIDC application. Navigate to the Configuration tab and click the “edit” icon.

To configure the application, add the following settings.

  • Response Type: Select the Code checkbox.
  • Grant Type: Select the Authorization Code checkbox, and set PKCE Enforcement to “Optional.”

Warning: Setting a grant type other than Authorization Code may compromise your security posture.

Screenshot of the Edit Configuration modal window with the following settings: Resource type is set to “Code”; Grant type is set to “Authorization Code” (with PKCE enforcement set to “Optional”); Redirect URIs has one option set (

Click the Save button to save your configuration.

Finally, enable the Chainguard application by toggling the knob in the top right corner.

Screenshot of the Overview tab, with the toggle button turned on. Additionally, the toggle button is highlighted with a magenta circle.

This completes configuration of the Ping application. You’re now ready to configure the Chainguard platform to use it.

Configuring Chainguard to use Ping SSO

To configure Chainguard make a note of the following settings from your Ping application. These can be found in the Ping console under the Configuration tab of the Application page.

  • Client ID
  • Client Secret
  • Issuer URL

Next, log in to Chaingaurd with chainctl, using an OIDC provider like Google, Github, or GitLab to bootstrap your account.

chainctl auth login

Note that this bootstrap account can be used as a backup account (that is, a backup account you can use to log in if you ever lose access to your primary account). However, if you prefer to remove this rolebinding after configuring the custom IDP, you may also do so.

Lastly, create a new identity provider using the Ping application details you noted previously.

export NAME=ping-id
export CLIENT_ID=<your client id here>
export CLIENT_SECRET=<your client secret here>
export ISSUER=<your issuer url here>
chainctl iam identity-provider create \
  --configuration-type=OIDC \
  --oidc-client-id=${CLIENT_ID} \
  --oidc-client-secret=${CLIENT_SECRET} \
  --oidc-issuer=${ISSUER} \
  --oidc-additional-scopes=email \
  --oidc-additional-scopes=profile \

You’ll be prompted to select a Chainguard IAM group under which to install your identity provider. Your selection won’t affect how your users authenticate but will have implications on who has permission to modify the SSO configuration. For more information, check out the IAM and Security section of our Introduction to Custom Identity Providers in Chainguard.

Last updated: 2023-10-26 15:22