1.0 Introduction
This article outlines the necessary steps required to configure a connection between Fortanix Key Insight, Google Cloud Platform (GCP), and Ping Identity as an OpenID Connect (OIDC) Identity Provider (IdP) using the Client credentials flow (machine-to-machine authentication).
Federated authentication in GCP enables workloads to access Google Cloud resources using credentials issued by an external Identity Provider, such as Ping Identity. This setup allows organizations to use a centralized Identity Provider without distributing Google service account keys to external systems.
Configuring Ping Identity as an OIDC IdP with GCP involves the following steps:
Register a client application in Ping Identity.
Obtain the client ID and client secret.
Obtain the OpenID configuration document (well-known) URL.
Verify the client application configuration.
Configure a Workload Identity Pool and Provider in GCP.
Grant the required IAM permissions to the Google service account.
Onboard the GCP connection in the Fortanix Key Insight user interface (UI).
WARNING
When configuring Google Cloud with an external identity provider (such as Ping Identity), even minor mismatches in settings (such as issuer URL, audience, claims mapping, or similar settings) can cause authentication failures, often with unclear error messages.
Refer to the official documentation for both Google Cloud and your Identity Provider for detailed configuration and troubleshooting guidance.
2.0 Register a Client Application with Ping Identity
Perform the following steps to register a client application in Ping Identity:
Set up an OIDC web application in Ping Identity:
Navigate to the Applications section in the Ping Identity console.
Click the '+' icon next to the Applications title to add a new application.
Enter the required values for Application Name, Description, and Icon.
Select OIDC Web App as the Application Type.
Save the application.
For more information, refer to Adding an Application.
Edit the Configuration section of the newly created OIDC application:
Response Type: Token
Grant Type: Client Credentials (The Implicit grant type may remain enabled due to Ping UI defaults but is not used in this integration).
Token Endpoint Authentication Method: Client Secret Basic

Figure 1: Application configuration
For more information, refer to Editing an application - OIDC.
Edit the Resources section of the application and add the custom resource ping_one_gcp_federation that was created earlier. This resource is requested during token issuance and is used in the scope when Fortanix Key Insight requests an access token from Ping Identity.
For more information on creating a custom resource, refer to Adding a custom resource.

Figure 2: Configure resource section
3.0 Obtain the Client ID and Client Secret
The Client ID uniquely identifies the registered application, and the Client Secret is used to authenticate the client during token requests.
To retrieve these values:
Navigate to the application’s Overview section in Ping Identity.
Copy the Client ID.
Copy the Client Secret.

Figure 3: Obtain Client ID and Secret
NOTE
Ensure both values are stored securely. They are required when configuring the GCP connection in the Fortanix Key Insight UI.
4.0 Obtain the OpenID Configuration Document (well-known) URL
An OpenID Connect provider exposes a standard discovery endpoint that contains metadata required for token validation.
To retrieve the well-known URL:
Navigate to the application’s Overview section in Ping Identity.
Copy the OIDC Discovery Endpoint value.

Figure 4: Access Well-known URL
NOTE
Ensure to record the well-known URL. This value is required when configuring the identity provider during GCP cloud connection onboarding in the Fortanix Key Insight UI.
5.0 Verify the Application Configuration
After completing the Ping Identity configuration, validate the setup directly from the application.
On the Configuration tab, click Get Access Token to generate a token.

Figure 5: Obtain the Access Token
After the token is generated, copy the Access Token and paste it into https://jwt.io to decode its claims.
Review the decoded token to confirm that the configuration is correct before proceeding.
Copy the following values: These values are required later when configuring Google Cloud.
iss(Issuer) – Verify that the audience aligns with the configured audience in Google Cloud.aud(Audience) – Verify that the audience aligns with the configured audience in Google Cloud.

Figure 6: Decode the Access Token
6.0 Set Up Workload Identity Federation in Google Cloud Platform
Perform the following steps to configure Workload Identity Federation in the GCP platform:
6.1 Create a Google Cloud Service Account
Perform the following steps to create a Google Cloud Service Account:
Sign in to the Google Cloud Console.
Navigate to IAM & Admin → Service Accounts.
Click Create Service Account.
Enter a name and description.
Click Create and Continue.
In the Permissions (Optional) section, click Continue.
Click Done.
Example: scannerserviceaccount@my-project.iam.gserviceaccount.com
6.2 Create a Workload Identity Pool
Perform the following steps to create a Workload Identity Pool:
Navigate to IAM & Admin → Workload Identity Federation.
Click Create Pool.
Enter a pool name. For example, pingoneca.
Save the pool.
6.3 Create an OIDC Provider in the Workload Identity Pool
After creating the pool, perform the following steps to create a new OIDC Provider within the pool:
Select the pool created in Section 6.2 Create a Workload Identity Pool.
On the provider configuration page, configure the following using values from the Ping Identity-issued JWT obtained in Step 3 of Section 5.0: Verify the Application Configuration.
Issuer (URL): Enter the
issvalue.Allowed audiences: Enter the
audvalue.
Ensure the Enabled provider toggle is enabled.
In the Attribute mapping section, verify that Google 1 (google.subject) is mapped to OIDC 1 (assertion.client_id).
Click Save to complete the configuration.
NOTE
In the Audiences section, select the Default audience option and copy the displayed value. This value is required later when configuring the GCP connection in Fortanix Key Insight.
Example:
https://iam.googleapis.com/projects/787320417052/locations/global/workloadIdentityPools/pingoneca/providers/pingoneca

Figure 7: Configure OIDC provider in GCP
7.0 Grant IAM Permissions in Google Cloud
Perform the following steps to grant access to the required resources:
Sign in to the Google Cloud Console and navigate to IAM.
Select the required project.
Click Grant access.
In the New principals field, enter the principal value.
Construct this value using the Default audience obtained in Step 3 of Section 6.0: Set Up Federated Identity on Google Cloud Platform, with the following modifications:
Replace
httpswithprincipalSet.After the
workloadIdentityPoolsname, replace everything that follows with/*
Example:
Default audience:
https://iam.googleapis.com/projects/787320417052/locations/global/workloadIdentityPools/pingoneca/providers/pingonecaPrincipal value:
principalSet://iam.googleapis.com/projects/787320417052/locations/global/workloadIdentityPools/pingoneca/*In the Select a role drop down list, select Workload Identity User role.
Click Save to assign the required permissions.

Figure 8: Assign IAM Role
8.0 Onboard GCP Connection In Fortanix Key Insight
After completing the Ping Identity configuration, provide the following details in Fortanix Key Insight when onboarding the GCP connection using the Client credentials flow:
Client ID
Client Secret
Well-known URL
Scopes
For more information on configuring an IdP configuration using the Client credentials flow during GCP connections onboarding, refer to Getting Started with Cloud Connection.