CIS14: PingID
-
Upload
cloudidsummit -
Category
Technology
-
view
278 -
download
1
description
Transcript of CIS14: PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 2
swipe > work
Shmulik Ben-Shemen GM Mobile & Strong Authentication Ping Identity
So how do you want your strong auth?
Copyright © 2014 Ping Identity Corp. All rights reserved.3
Introducing PingID
Copyright © 2014 Ping Identity Corp. All rights reserved. 4
• Multifactor authentication via mobile app for PingOne® and PingFederate®
• Define and enforce policies tailored to
your needs
• Simple security for end users
Swipe to Sign On
USING IT PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 5
Using PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 6
User signs on to PingOne® 1
Using PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 7
Authentication notification is pushed to your device 2
Using PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 8
Swipe to authenticate 3
Using PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 9
Off to work you go! 4
Using PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 10
Swipe to authenticate at sign on
No connection? No problem! Available one-time passcode when device is offline
Manage and change the device you use
HOW IT WORKS PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 11
How PingID Works
Copyright © 2014 Ping Identity Corp. All rights reserved. 12
DESKTOP SIGN-ON
Authorization request Authorization reply
How PingID Works
Copyright © 2014 Ping Identity Corp. All rights reserved. 13
VERIFIED USER ACCOUNT
DESKTOP SIGN-ON
Authorization request
1
Authorization reply
How PingID Works
Copyright © 2014 Ping Identity Corp. All rights reserved. 14
MOBILE NOTIFICATION
SERVER
VERIFIED USER ACCOUNT
USER’S MOBILE DEVICE DESKTOP SIGN-ON
Authorization request
1
Notify PingID app on device 2
3
Push notification
How PingID Works
Copyright © 2014 Ping Identity Corp. All rights reserved. 15
MOBILE NOTIFICATION
SERVER
VERIFIED USER ACCOUNT
USER’S MOBILE DEVICE DESKTOP SIGN-ON
Authorization request
1
Notify PingID app on device 2
3
Push notification
4 Out Of Band Authentication
How PingID Works
Copyright © 2014 Ping Identity Corp. All rights reserved. 16
MOBILE NOTIFICATION
SERVER
VERIFIED USER ACCOUNT
USER’S MOBILE DEVICE DESKTOP SIGN-ON
Authorization request
1
Notify PingID app on device 2
3
Push notification
4 Out Of Band Authentication
5 Authorization reply
How PingID Works
How PingID Works
Copyright © 2014 Ping Identity Corp. All rights reserved. 18
MOBILE NOTIFICATION
SERVER
VERIFIED USER ACCOUNT
USER’S MOBILE DEVICE DESKTOP SIGN-ON
Authorization request
1
Notify PingID app on device 2
3
Push notification
4 Out Of Band Authentication
5 Authorization reply PingID Agent
User Store
VPN
How PingID Works
Copyright © 2014 Ping Identity Corp. All rights reserved. 19
MOBILE NOTIFICATION
SERVER
VERIFIED USER ACCOUNT
USER’S MOBILE DEVICE DESKTOP SIGN-ON
Authorization request
1
Notify PingID app on device 2
3
Push notification
4 Out Of Band Authentication
5 Authorization reply
Your Service Here
GETTING IT PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 20
Deploy PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 21
1st or 2nd Factor Auth
2nd Factor Auth
Pair Your Device
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 22
User scans the QR code from the app
Device is registered and ready for use
User is prompted to install the PingID mobile app
WHAT’S IT WORTH TO YOU? PingID
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 23
The Customer Perspective
Copyright © 2014 Ping Identity Corp. All rights reserved.24
One secure app to authenticate any employee, partner or customer
One authentication service for any cloud, web, VPN or mobile service
Service
Benefits
Replace passwords or add multi-factor
Smarter and faster than tokens and OTPs
Lower TCO—no hardware and transaction cost
More than access—brand and fit for yourself
Use across channels— mobile, online, call center, POS
What’s Next for You
Copyright © 2014 Ping Identity Corp. All rights reserved. 25
What you have Where you are What/Who you are What you know
DEMO…
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 26
Try us – www.pingidentity.com
Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 27
THANK YOU!
Copyright © 2014 Ping Identity Corp. All rights reserved. 28 Confidential — do not distribute
PingID - Roadmap
Phase I • Ping One / Ping Fed Support • Managed by customers • Self Service • PingID as 1st or 2nd Factor • SMS support • VPN (Limited Support)
Phase II • Location Based Policies • Secure Data Capture • SDK • VPN (Extended Support)
Phase III • Risk Based Authentication • Continuous Authenticaiton • Biometrics
H2/14 H1/15 H2/15