CIS14: PingID

29

description

Shmulik Ben-Shemen, Ping Identity Demonstration of Ping Identity’s newest solution to the Identity challenge, using your mobile device as part of a strong authentication solution that integrates with Ping’s other solutions—PingFederate and PingOne

Transcript of CIS14: PingID

Page 1: CIS14: PingID
Page 2: CIS14: PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 2

swipe > work

Shmulik Ben-Shemen GM Mobile & Strong Authentication Ping Identity

Page 3: CIS14: PingID

So how do you want your strong auth?

Copyright © 2014 Ping Identity Corp. All rights reserved.3

Page 4: CIS14: PingID

Introducing PingID

Copyright © 2014 Ping Identity Corp. All rights reserved. 4

•  Multifactor authentication via mobile app for PingOne® and PingFederate®

•  Define and enforce policies tailored to

your needs

•  Simple security for end users

Swipe to Sign On

Page 5: CIS14: PingID

USING IT PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 5

Page 6: CIS14: PingID

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 6

User signs on to PingOne® 1

Page 7: CIS14: PingID

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 7

Authentication notification is pushed to your device 2

Page 8: CIS14: PingID

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 8

Swipe to authenticate 3

Page 9: CIS14: PingID

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 9

Off to work you go! 4

Page 10: CIS14: PingID

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 10

Swipe to authenticate at sign on

No connection? No problem! Available one-time passcode when device is offline

Manage and change the device you use

Page 11: CIS14: PingID

HOW IT WORKS PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 11

Page 12: CIS14: PingID

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 12

DESKTOP SIGN-ON

Authorization request Authorization reply

Page 13: CIS14: PingID

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 13

VERIFIED USER ACCOUNT

DESKTOP SIGN-ON

Authorization request

1

Authorization reply

Page 14: CIS14: PingID

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 14

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

Page 15: CIS14: PingID

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 15

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

Page 16: CIS14: PingID

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 16

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

5 Authorization reply

Page 17: CIS14: PingID

How PingID Works

Page 18: CIS14: PingID

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 18

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

5 Authorization reply PingID Agent

User Store

VPN

Page 19: CIS14: PingID

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 19

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

5 Authorization reply

Your Service Here

Page 20: CIS14: PingID

GETTING IT PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 20

Page 21: CIS14: PingID

Deploy PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 21

1st or 2nd Factor Auth

2nd Factor Auth

Page 22: CIS14: PingID

Pair Your Device

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 22

User scans the QR code from the app

Device is registered and ready for use

User is prompted to install the PingID mobile app

Page 23: CIS14: PingID

WHAT’S IT WORTH TO YOU? PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 23

Page 24: CIS14: PingID

The Customer Perspective

Copyright © 2014 Ping Identity Corp. All rights reserved.24

One secure app to authenticate any employee, partner or customer

One authentication service for any cloud, web, VPN or mobile service

Service

Benefits

Replace passwords or add multi-factor

Smarter and faster than tokens and OTPs

Lower TCO—no hardware and transaction cost

More than access—brand and fit for yourself

Use across channels— mobile, online, call center, POS

Page 25: CIS14: PingID

What’s Next for You

Copyright © 2014 Ping Identity Corp. All rights reserved. 25

What you have Where you are What/Who you are What you know

Page 26: CIS14: PingID

DEMO…

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 26

Page 27: CIS14: PingID

Try us – www.pingidentity.com

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 27

Page 28: CIS14: PingID

THANK YOU!

Copyright © 2014 Ping Identity Corp. All rights reserved. 28 Confidential — do not distribute

Page 29: CIS14: PingID

PingID - Roadmap

Phase I • Ping One / Ping Fed Support • Managed by customers • Self Service • PingID as 1st or 2nd Factor • SMS support • VPN (Limited Support)

Phase II • Location Based Policies • Secure Data Capture • SDK • VPN (Extended Support)

Phase III • Risk Based Authentication • Continuous Authenticaiton • Biometrics

H2/14 H1/15 H2/15