Strategy One
Integrate Strategy with PingOne OIDC Single Sign-On
Starting in Strategy One (September 2025), you can integrate Strategy with PingOne OIDC single sign-on (SSO).
Prerequisite
Configure OAuth Parameters: Authorization Code Workflow
Create a Data Source Using OIDC Single Sign-on as an Authentication Mode
-
Open the Workstation window.
-
Connect to an environment.
-
Create an Enterprise Security Object. For more information, see Manage OAuth Enterprise Security with Identity and Access Management (IAM) Objects.
All required information should be collected in Configure OAuth Parameters: Authorization Code Workflow.
-
Leave the Client Secret field blank.
-
Click Save.
-
Click
, next to Data Sources.
-
Choose Snowflake.
-
Expand the Default Database Connection drop-down list and choose Add New Database Connection.
-
Expand the Driver drop-down list and choose the JDBC or ODBC driver.
-
Enter your Server and other optional fields.
-
Expand the Authentication Mode drop-down list and choose OIDC Single Sign-On.
-
Expand the Authentication Service drop-down list and choose an authentication service or click Add New Authentication Service.
For more information, see Manage OAuth Enterprise Security with Identity and Access Management (IAM) Objects.
-
In Scope, enter the same value you defined in your Enterprise Security Object.
-
Click Save.
-
Type a Name.
-
Click Save.
Create and Map Users to PingOne
-
Open the Workstation window.
-
Connect to an environment.
-
In the Navigation pane, click User and Groups.
-
In the Navigation pane, click
next to All Users.
-
In Account and Credentials, enter a Full Name, Email Address, Username, and Password, if required.
-
In the left pane, click Privileges and add the following privileges:
-
Access data from Databases, Google BigQuery, BigData, OLAP, BI tools
-
Create and edit database instances and connections
-
Create and edit database logins
-
Create configuration objects
-
Create dataset in Workstation
-
Configure project data source
-
Monitor Database Connections
-
Use Workstation
-
-
In the left pane, click Authentication.
-
In Trusted Authenticated Request User ID, type the user's email address.
-
Click Save.
Configure OIDC
-
Enable OIDC Authentication for Strategy Library.
Ensure the redirect URIs are added to Configure OAuth Parameters: Authorization Code Workflow in the Step 1 section.
-
Enter your Client ID and Issuer. These values can be found from the Native app you created in Configure OAuth Parameters: Authorization Code Workflow.
-
Ensure User Claim Mapping has the same values as your native app.
-
Expand Advanced and in Scopes, add
session:role-any
andoffline_access
. -
Restart Web server.
Single Sign-On with OIDC
-
Open the Workstation window.
-
Connect to an environment.
-
Right-click the environment and click Edit Environment Information.
-
In Authentication Mode, select Default OIDC and click Continue.
-
Login to your PingOne account in the dialog.
-
Use an Administrator account to grant privileges to the new user.
You can ignore this step if you have mapped the user to your Entra ID account and already granted privileges.
-
In the Navigation pane, click
next to Datasets.
-
In the Project drop-down list, choose a project.
-
Select Data Import Cube and click OK.
-
Choose the data source you created above.
The namespaces and tables display.