BeheerconsoleInloggen met SSO

Ping Identity OIDC Implementation

This article contains Ping Identity specific help for configuring Login with SSO via OpenID Connect (OIDC). For help configuring Login with SSO for another OIDC IdP, or for configuring Ping Identity via SAML 2.0, see OIDC Configuration or Ping Identity SAML implementation.

Configuration involves working simultaneously within the Bitwarden web app and the Ping Identity Administrator Portal. As you proceed, we recommend having both readily available and completing steps in the order they are documented.

Open SSO in the web vault

Log in to the Bitwarden web app and open the Admin Console using the product switcher:

Product switcher
Product switcher

Select SettingsSingle sign-on from the navigation:

OIDC-configuratie
OIDC-configuratie

If you haven't already, create a unique SSO identifier for your organization. Otherwise, you don't need to edit anything on this screen yet, but keep it open for easy reference.

tip

Er zijn alternatieve ontcijferingsopties voor leden. Leer hoe u aan de slag kunt met SSO met vertrouwde apparaten of Key Connector.

Create OIDC app

In the Ping Identity Administrator Portal, select Applications and the Icon at the top of the screen to open the Add Application screen:

Ping Identity OIDC App
Ping Identity OIDC App

Add application

  1. Enter a Bitwarden Specific name in the Application Name field. Optionally, add desired description details as needed.

  2. Select the OIDC Web App option and select Save once you have finished.

Configure application

On the Application screen, select the Configuration tab and then the edit button located on the top right hand of the screen.

Ping OIDC Configuration Edit
Ping OIDC Configuration Edit

In the edit screen, fill in the following values retrieved from the Bitwarden Single sign-on screen:

Once this step has been completed, select Save and return to the Configuration tab on the Ping Identity Application screen. No other values on this screen require editing.

Resources

On the Resources tab of the Ping Identity Application screen, select the edit icon and enable the following allowed scopes:

  • email

  • openid

Back to the web app

At this point, you have configured everything you need within the context of Ping Identity. Return to the Bitwarden web app to configure the following fields:

When you are done configuring these fields, Save your work.

tip

Je kunt gebruikers verplichten om in te loggen met SSO door het authenticatiebeleid voor eenmalige aanmelding te activeren. Let op, hiervoor moet ook het beleid voor één organisatie worden geactiveerd. Meer informatie.

Test the configuration

Once your configuration is complete, test it by navigating to https://vault.bitwarden.com, entering your email address, selecting Continue, and selecting the Enterprise single sign-on button:

Enterprise single sign on en hoofdwachtwoord
Enterprise single sign on en hoofdwachtwoord

Enter the configured organization identifier and select Log In. If your implementation is successfully configured, you will be redirected to the Ping Identity login screen:

Ping Identity SSO
Ping Identity SSO

After you authenticate with your Ping credentials, enter your Bitwarden master password to decrypt your vault!

note

Bitwarden ondersteunt geen ongevraagde antwoorden, dus inloggen vanuit je IdP zal resulteren in een foutmelding. De SSO-aanmeldingsstroom moet worden geïnitieerd vanuit Bitwarden.

Next steps

Suggest changes to this page

How can we improve this page for you?
For technical, billing, and product questions, please contact support