Strong authentication systems are not new, but the way that they have been deployed has changed. Many of these existing solutions are expensive hardware tokens that need to be issued, shipped, revoked and maintained. This scenario demands a lot of effort, time and money. But it doesn’t have to be this way. With PingID MFA, users simply install an app on their phone and register that device with the PingID service. One app gives you strong authentication for all of the things you need to get work done—regardless of where you are or which device you’re using.
PingID MFA supports both Apple and Android phones and tablets as well as YubiKey, a small hardware device that offers two-factor authentication with a simple touch of a button. When policy dictates the need for strong authentication, a push notification will be sent to the phone that the user has registered. They will be prompted to swipe on the application and they will be given access to the application. If wireless network issues prevent the notification from being delivered to the phone, the end user will be prompted to enter a one-time passcode (OTP) that is generated by the application. If they are using a YubiKey, they will simply plug the hard token into their computer and press the button on the Yubikey. For other mobile phone platforms, the user can receive an OTP via SMS or a call to the phone.
With PingID MFA, you can easily control when your users need to authenticate with a second factor. You can configure your policies based upon group membership in a directory, require step-up authentication for specific applications, the users’ location based upon the IP address or require it for all sign-on attempts. PingID MFA delivers the granular security that your policies need with the ease of use your users need.
Our flexible, secure multi-factor authentication solution easily integrates with dozens of third-party, two-factor and strong authentication providers. You can connect to systems like RSA SecureID, Symantec VIP, Safenet, Google Authenticator and many more. You get the security you need without the added expense of replacement software or custom development. Visit our software downloads to see our integrations.