Ping Identity integration
StifleR integrates with Ping Identity using OpenID Connect (OIDC) to provide centralized authentication and authorization based on identity groups. This approach allows organizations to control access to the StifleR Dashboard and its features without managing local users, aligning StifleR with modern identity and Zero Trust practices.
At a high level, Ping Identity is responsible for authenticating users and issuing identity tokens, while StifleR consumes group information from those tokens to determine what a user is allowed to see and do.
Global access control via pingIdentity groups
StifleR supports global access control by mapping Ping Identity groups directly to predefined access levels. During authentication, the user’s group membership is included in the OIDC token and evaluated by StifleR.
Typical usage includes:
A read-only group that grants visibility across the StifleR Dashboard without allowing changes.
An administrative group that provides full access to view, modify, and manage StifleR configuration and data.
These groups are defined in Ping Identity and referenced in the StifleR Service Config Editor, ensuring that access is enforced consistently for all users logging in through Ping Identity.
Centralized and auditable access management
By using Ping Identity as the authentication provider, all user access to StifleR is centrally managed and auditable. User lifecycle actions such as onboarding, role changes, or removal of access are handled entirely in Ping Identity, with no need to modify StifleR directly.
This model reduces administrative overhead, improves security posture, and ensures that StifleR access always reflects the organization’s identity governance policies.
Configuration
Create Groups in PingIdentity
Log in to the PingIdentity admin console and navigate to Groups.

Create the following groups using the Default population:
DefaultStifleRRead – global read-only access to the StifleR Dashboard
DefaultStifleRAdmins – full administrative access

Configure Attribute Mappings
Open the applications and create application of OIDC type.

Attributes must be mapped so that tokens include user information (e.g., groups).
Navigate to Attribute Mappings.

Edit the mappings and add a new global attribute:
Name: groups
PingOne Mapping: Group Names
Save the changes.

Verify that the attribute is included in the "openid" scope.

Configure Resources and Scopes
Open the Resources tab and select Edit.

Enable the following scopes:
profile (required)
phone, address, email (optional)
Save the configuration.

Navigate to Resources → OpenID Connect → Attributes → Edit and map:
Username → name
Username → preferred_username
Save the changes.

Configure Application Settings
Go to Applications → [Your Application] → Configuration → Edit.
Configure:
Response Types: Authorization Code, Access Token, ID Token
Grant Types: Authorization Code, Implicit
Redirect URI: Full StifleR backend URL (including port)
Sign-off URL: Same as Redirect URI
Save the configuration.

Activate the Application
Set the application state to Active.

Configure StifleR for PingIdentity
Collect Application Values
From the PingIdentity application configuration, note the following values for use in StifleR:
AuthAuthority → Issuer URL e.g.: https://auth.pingone.eu/[EnvironmentID]/as/ (must include trailing slash)
AuthClientId → Client ID (GUID)
AuthRedirectUri → Same as configured
Dashboard URL → https://[Full StifleR URL]/#
StifleR Service Config Editor
Run the StifleR Service Config Editor and open Access Settings.
Configure:
Authentication Method: oidc
OIDC Provider: PingIdentity
OIDC Claim Type: groups
OIDC Groups with StifleR Global Admin Access: DefaultStifleRAdmins
OIDC Groups with Stifler Global Read Access: DefaultStifleRRead
OIDC Issuer URL: https://auth.pingone.eu/[EnvironmentID]/as
OIDC Redirect URL: https:///api/Account/Callback
OIDC Dashboard URL: Full URL to StifleR Dashboard
Save the configuration.


Configure Dashboard Authentication
On the StifleR Dashboard server, update config.json:
authprovider = 2 (PingIdentity)
Save the file.

Configure RBAC with PingIdentity
PingIdentity Group for RBAC
Create an additional PingIdentity group for RBAC use.

Add users to the group.

Create Claim Rule in StifleR
In the StifleR Dashboard, go to Administration → Security → Rules → New Rule.
Configure:
Type: Claim
Claim Type: External
Claim Name: groups
Claim ID: PingIdentity group name

Create and Assign Role
Go to Administration → Security → Roles → New Role.
Configure the role name, access area, and allowed operations. Save the role.

Expand the newly created Role add click Add Rule

Validate Permissions
Log in with a user who belongs to the PingIdentity group.
Open the user menu in the top-right corner and verify assigned roles.

Last updated

