Ping (SSO and User Provisioning)

Single Sign On (SSO) is available for DocBoss. If enabled, users with the company domain will be redirected to their identity provider to sign in to access DocBoss. The instructions below outline how to set up SSO and SCIM with DocBoss when using Ping as the identity provider.

SSO:

  1. Open Manage Environment -> Application page
  2. Click to add a new application on the "+" icon near the page title.
  3. Set the name for the application and choose "OIDC Web App" type. Click to save.
  4. Copy Client ID, Client Secret on the Configuration tab, general block. Make note of these to send to DocBoss Support.
  5. Copy OIDC Discovery Endpoint on the Configuration tab, URLs block. Make note of this to send to DocBoss Support.
  6. Click to edit Configuration settings (edit icon on the top of the configuration tab).
  7. Set Redirect URIs [we give value to the instance] and set Token Auth Method = "Client Secret Post".
  8. Choose "Resources" tab and click to edit allowed scopes.
  9. Select "email" and "profile" scopes and save.

SCIM:

  1. Open Manage Environment -> Directory -> User Attributes page.
  2. Click to add a new attributes on the "+" icon near the page title.
  3. Add two attributes: userType and affiliate, type = declared.
  4. Open Manage Environment ->Integrations -> Provisioning page (see below)
  5. Click to add a new connection on the "+" icon near the page title.
  6. Choose a connection type "Identity Store".
  7. Choose "SCIM Outbound" and click next.
  8. Set the name for the application and click next.
  9. Set following values and click next : 
    •     SCIM BASE URL = https://systemX.docboss.com/scim/v2 [X should be replaced with system number empty or 2, 3, 4, 5, 6]
    •     SCIM Version = 2.0
    •     Authentication Method = OAuth 2 Bearer Token
    •     Oauth Access Token = Docboss long term token [copy from docboss]
  10. Set  User Filter Expression = userName eq "%s"  and click to save [case sensitive]
  11. Click on the "+" icon near the page title to add a new rule
  12. Set the name and click to create the rule.
  13. Select created connection and save
  14. Click to edit filter and set how the users should be selected for provisioning and save
  15. Add mapping for fields. Remove excess fields added for mapping by default. 
  16. List of  all avaliable parameters:
    •     "userName" - required, value should be unique. Value will be saved as login for user
    •     "familyName" - required
    •     "givenName" - required
    •     "active" - required. Value is used to disable\enable user
    •     "userType" - not required. If user doesn't add field to mapping OR send empty value "View" role will be saved. Allowed values are Admin, Full, Reviewer, View [case sensetive]
    •     "affiliate" - not required. Created with instance affiliate will be set for user
    •     "title" - not required. User can skip adding this field to mapping
  17. Enable connection
  18. Enable rule