Configuration
v5.12.0
Search this version
Configuration
Configuration
Title
Message
Create new category
What is the title of your new category?
Edit page index title
What is the title of the page index?
Edit category
What is the new title of your category?
Edit link
What is the new title and URL of your link?
Configure OIDC SSO - Ping Idetity
Copy Markdown
Open in ChatGPT
Open in Claude
This article applies to all MetaDefender ICAP releases deployed on Windows and Linux systems.
Create OIDC directory on MD ICAP
- Sign in to MetaDefender ICAP.
- In the dashboard, click on
User Managementin the left sidebar. - On
User Managementpage, selectDirectoriestab and clickAdd Directoryin the top right

- In
Add Directorypage, chooseOIDCinDirectory Type, fillNamefor the new directory, MDICAP-OIDC for example - Fill
Host or IPwhere MD ICAP is hosting, https://127.0.0.1:8048 for this example - Copy string generated under Login URL and store to redirect_uri

Create and configure OIDC application on PingOne
- In the PingOne Overview page, navigate
Applicationson sidebar

- Click the plus button to add a new application.

- Enter the application name, MDICAP-OIDC as an example, choose
OIDC Web AppforApplication Type, and clickSave.

- Select
Configurationtab, hit Edit button

- In
Edit Configurationpage, navigate toRedirect URIsand paste redirect_uri to the box below, then hitSave

- In
Overviewtab, navigate toOIDC Discovery Endpoint, copy the link below and store to metadata_url

- Select
Configurationtab, expandGeneralsection, navigate toClient IDandClient Secret, copy and store them in client_id and client_secret.
__

- Select
Attribute Mappingstab and hit Edit button

- In
Edit Attribute Mappingspage, hitAddto add new mapping

In this step, we make a mapping from the key name used by MD ICAP and the name exported by PingOne. For example, we set given_name mapped to Given Name exported by PingOne. Later on, given_name is used by MD ICAP to identify the login user
- Fill attribute name, given_name in this example, select item Given Name in PingOne Mappings and hit Save to complete

- Enable the new application on PingOne

Complete configuration on MD ICAP
- Switch back to MD ICAP, under
Identity Provider, hitFetch URL, paste metadata_url to the box under, and then hitOK, which requests MD ICAP to check and set PingOne as its IDP if succeed

- Under
Service Provider, paste client_id and client_secret to boxes underClient IDandClient secretrespectively - Fill ${given_name} in the box under
User identified by - Select
Default roleoption, choose the role to assign to login user underUser Roleand hitAddto complete setting on MD ICAP.

Note: When we successfully fetch, Scope default will be selected is OPENID
- In
User Managementpage, toggle the new directory, MDICAP-OIDC in this example. A dialog box is shown to confirm the action.

Test the integration
- In Home screen on MD ICAP, the user is redirected to login page having “Sign-In with SSO” option

- Select
Sign-In with SSOand Select Directory to LoginMDICAP-OIDCin this example

Result Sign on using IDP authentication

- Login by the account registered to PingIdentity
- If everything goes right, MD ICAP dashboard is shown with user identity set at the top right corner

- Otherwise, access back login page at
<mdicap-host>#/public/loginand sign in using the local administrator account for troubleshooting purposes.
If Further Assistance is required, please proceed to log a support case or chatting with our support engineer.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Last updated on Jan 5, 2026
Was this page helpful?
Next to read:
LoggingDiscard Changes
Do you want to discard your current changes and overwrite with the template?
Archive Synced Block
Message
Create new Template
What is this template's title?
Delete Template
Message
