FAQs

Find Answers to Frequently Asked Questions

Documentation and Technical FAQs

For Ping-managed open source tools, frameworks, blueprints, reference architectures and more see our public GitHub and our developer site.

Free Trial and Product Demo FAQs

While there isn’t a free version of our products, you can try Ping for 30 days.

You can start a trial of PingOne and get instant access today.

Many of our solutions have user journey and product demos in our video resource library. And when you’re ready to whiteboard your own optimal user journey and see a live demo, contact sales.

Customer Support FAQs

Severity Level 1 requests are supported 24/7/365 and we respond to all other support requests within 24 hours on business days.

A complete list of Service Level Agreements by case severity can be found in our Support Policy.

Ping Identity provides support in English.

Ping Identity maintains a 99.99% uptime availability.

Users can view the real-time status of Ping’s services on our Ping Identity Status page and sign up for notifications.

The Support Portal may include a case submission form, case status and history, security advisory history, license history, access to download licensed Products, knowledge base articles and documentation. See the Support Portal Guide for more information

Yes! A full list of our available training offerings can be found on our Training and Certifications page

Registered customers assigned with case management permission are able to open support cases. A full list of the roles and their associated permissions can be found in our Support Portal Administration Guide.

Anyone! Simply register an account to get started.

Identity Security and Access Management FAQs

Identity and access management (IAM) is a security framework that helps organizations identify a network user and control their responsibilities and access rights, as well as the scenarios under which the privileges are issued or denied. IAM typically refers to authorization and authentication capabilities such as single sign-on (SSO) and multi-factor authentication (MFA).

Customer identity and access management (CIAM) enables organizations to control customer access to applications and services and securely manage customer identity data to ultimately create a customer experience that is both seamless and secure.

Our proven path for migrating identity to the cloud is to first establish a cloud identity authority, then optimize identity in the cloud with capabilities like MFA and risk management and finally consolidate your legacy systems. The fastest way to achieve these three steps is to leverage the Ping Identity Platform.

A Zero Trust security strategy does not rely on the inherent trustworthiness of an organization's network to determine who should have access to apps and resources. Authentication and authorization decisions are instead based on the identity and dynamic risk of each user, device, app or transaction.

The philosophy of Zero Trust networks is that you should trust no one and verify everyone. To put this into practice the following five-part framework is suggested:

 

  • Validating the network is no longer enough
  • Authenticate the user
  • Authenticate and validate the device
  • Authenticate the application
  • Authorize the transaction

Enterprise Security Assertion Markup Language (SAML) identity federation use cases generally revolve around sharing identity between an existing identity and access management (IAM) system and web applications. There are two actors in the SAML scenario, the Identity Provider (IdP) who “asserts” the identity of the user and the Service Provider (SP) who consumes the “assertion” and passes the identity information to the application.

MFA gives you assurance that users are who they say they are. It requires them to prove their identity by providing at least two pieces of evidence, each one from a different category. These categories include: something they know, something they have and something they are. Learn more on our Multi-Factor Authentication page.

Dynamic authorization assembles and evaluates data attributes from anywhere in the enterprise at the time of the transaction and conditionally authorizes access to the data or services in real time. Externalized authorization management centralizes authorization policies so the applications themselves do not need to maintain their own access policies. Serving as a central authorization system, the dynamic authorization service stores the rules and effectively acts as a “decision-as-a-service” resource. Learn more on our Dynamic Authorization page.

Fraud detection is the ability to identify fraud before and after a user is registered or "known" to an enterprise. Even before a user is known, fraud solutions can give you actionable data, identify fraudulent users and centralize fraud signals. After a user is known, user identities can be verified or challenged with step-up authentication factors if risk and fraud signals are high. Learn more on our MItigate Fraud Risk page.

Personal identity enables individuals, rather than a company or other organization, to control, manage and share their own identity-related information. With PingOne Neo, you can issue digital identity cards to your users that are tied to verified data and stored in the identity wallet, making it easy for them to share personal data with a simple link or scan of a QR code.

Partners and Investors FAQs

We’re always on the lookout for innovative companies looking to champion identity and the needs of the enterprise together with Ping. To see a full directory of all our current partners and more information on how your organization can join, visit our Partners page.

For more information on the benefits of joining our Technology Partner Program and to apply today, visit our Technology Partner Program page.

Start Today

See how Ping can help you deliver secure employee, partner, and customer experiences in a rapidly evolving digital world.