Ping Advanced Identity Software - Your IAM Private Cloud Fabric

May 29, 2025
-minute read
Director, Product & Solution Marketing

At Ping, we are fully committed to providing customers with software they can deploy, run, and manage themselves—on their terms. This is especially critical for industries with strict compliance mandates, data sovereignty requirements, or architectural constraints that make public cloud or SaaS unsuitable. Whether you're in financial services, government, telecommunications, or healthcare, Ping’s self-managed platform gives you the control and flexibility you need—without compromising on innovation.

 

This release provides new features and capabilities for the many customers and partners who rely on Ping’s self-managed software to meet the most complex identity and access needs in regulated, high-scale, private cloud or hybrid environments.

 

With support for Ping SDKs, DevOps, Kubernetes, containers, virtual machines, and IaaS platforms like AWS and GCP, customers can confidently deploy Ping’s identity solutions in private and public cloud environments. These deployments are accelerated by a growing library of automation tooling, infrastructure-as-code templates, and partner-delivered services, reducing operational complexity and accelerating time to value.

 

Ping is uniquely suited to solve the most complex identity challenges for the world’s largest enterprises at any scale, for any identity type, via any deployment method.

 

These updates to the self-managed products now provide even deeper integration and alignment with the broader Ping portfolio—bringing together modern orchestration, zero trust enforcement, digital trust services, and hybrid deployment flexibility under one cohesive platform.

Key Highlights of the Release

Elevated Identity Experience

Building Identity Experiences that streamline the end user journey has never been more important than today. A frictionless, secure and intuitive registration, authentication or check-out experience is a competitive differentiator. This is the reason why 8.0 is packed with new and innovative capabilities that make our Identity Experience Orchestration even better.

  • Node Designer – brand new way to extend the platform faster than ever, offering a better admin and developer experience encouraging reuse and reducing cost of change

"Node Designer streamlines the way teams extend and customize authentication journeys. It allows developers and administrators to create, manage, and deploy custom nodes faster and with less overhead—encouraging reuse, simplifying maintenance, and reducing the cost of change. By making it easier to build tailored experiences that align with unique business and security requirements, Node Designer accelerates time to value and enhances agility in how identity teams respond to evolving needs."

 

 

  • Application Centric Journeys – major milestone in making the platform more intuitive for administrators by connecting the concepts of applications and journeys

"Application-Centric Journeys make it easier for administrators to manage and align identity flows with specific applications. By directly linking journeys to individual apps, this feature simplifies configuration, improves visibility, and reduces the complexity of managing policies across a diverse application landscape. The result is faster deployment, easier maintenance, and a more intuitive way to deliver tailored user experiences that meet the unique access needs of each application—without duplicating effort or introducing risk."

 

 

  • Session Control – finegrained control over session timeouts on a journey level, instead of a “one-size-fits-all” approach for better yet secure end user experiences
  • New Nodes – out of the box nodes for faster time to value: reCAPTCHA Enterprise, Set Success/Failure Details, Flow Control and more

Enterprise-Grade Platform

Many of our customers are in regulated industries demanding industry standards-based and compliant solutions. In 8.0 we made unprecedented progress in this area.

  • FIDO Certified – we have been supporting WebAuthn in PingAM for a long time but this will be our first release that is FIDO certified

"FIDO certification ensures that authentication solutions meet strict, industry-recognized standards for strong, phishing-resistant authentication. For enterprises, this means greater assurance that their identity platform supports secure, passwordless login experiences using technologies like biometrics or security keys. With FIDO-certified capabilities, organizations can reduce the risk of credential-based attacks, improve user experience, and align with compliance requirements—especially in high-risk or regulated environments."

 

 

  • FAPI 1 Part 2: Advanced with PAR and JARM – being FAPI compliant gives our customers peace of mind that we integrate in Open Banking ecosystems

"FAPI compliance ensures that an identity platform meets rigorous security and interoperability standards required for protecting high-value transactions and sensitive data—especially in Open Banking and regulated financial services environments. With FAPI-compliant capabilities, organizations can ensure secure API access using advanced protocols like PAR (Pushed Authorization Requests) and JARM (JWT-secured Authorization Response Mode), helping prevent common threats like token leakage and authorization code interception. It’s a critical step for enabling safe, standards-based integrations in ecosystems where trust and compliance are non-negotiable."

 

 

  • FIPS 140-3 Compliant – stronger, secure and compliant cryptography in PingIDM, PingDS and PingGateway as demanded by our regulated customers

"FIPS 140-3 compliance ensures that a system’s cryptographic modules meet stringent U.S. government security standards for data protection. This certification is essential for organizations operating in federal, defense, and other highly regulated industries, as it validates that encryption and key management are implemented in a secure, reliable, and standards-based way. By supporting FIPS 140-3, Ping gives customers confidence that their identity infrastructure can meet the highest levels of cryptographic assurance required for protecting sensitive data and maintaining regulatory compliance."

 

 

Whether you're supporting government agencies, regulated industries, or global B2B ecosystems—we give you the compliance guardrails to move forward with confidence.

 

Trusted Foundation for Operations at Scale

We serve the largest enterprises on the planet. There is nothing more important than to provide secure, reliable and scalable solutions that they can trust. 8.0 ships with a range of new capabilities that simplifies the operational aspects of the platform.

  • Distributed Tracing – end-to-end visibility into the behaviour of the entire platform for faster troubleshooting, diagnostics and optimization

  • Java Flight Recorder (JFR) – better retrospective analysis of incidents allowing a precise and timely identification of root causes in PingDS

  • Performance Enhancements – including faster index rebuilds and more efficient deletion of nested groups in PingDS

  • Account Change Detection – better visibility of changes in remote systems for better governance and management of identity data in PingIDM

  • JSON Application Logging – easier parsing and analysis of PingIDM logs and better integration with analytics systems

Supported File-based Configuration – File-based configuration in PingAM is now supported in production deployments

"File-based Configuration provides a streamlined, version-controllable way to manage configuration using files. This approach enables teams to leverage infrastructure-as-code practices, integrate with CI/CD pipelines, and ensure consistency across environments. Now fully supported in production, it empowers DevOps and IAM teams to automate deployments, track changes, and accelerate delivery while reducing the risk of configuration drift or human error."

 

 

Comprehensive Platform Capabilities for Digital Trust 

The Ping portfolio of services provide all capabilities a modern enterprise needs to participate in trusted interactions in ecosystems where digital trust is essential. This release further simplifies how our customers can take advantage of Ping Identity Trust Services.

  • PingOne Protect & PingOne Verify Integration – last year we introduced Marketplace integrations between PingAM and the Identity Trust services. 8.0 now ships with our PingOne Protect and PingOne Verify integrations built into the core product

"The out-of-the-box integration of PingOne Protect and PingOne Verify into Ping’s self-managed software enables customers to easily embed advanced risk signals and identity verification directly into their identity journeys—without custom development or separate Marketplace installations. This simplifies how organizations enhance security and user trust by allowing real-time risk assessment and verified identity checks as part of the login or registration flow. It’s a key enabler for reducing fraud, improving compliance, and delivering smarter, low-friction user experiences."

 

 

  • PingGateway and Identity Trust Services – Thanks to incremental releases throughout the year PingGateway has reached an important milestone with its PingOne integration capabilities now providing native integrations with PingOne SSO, PingOne Authorize and PingOne Protect

"The native integration between PingGateway and Services—including PingOne Protect, PingOne Authorize, and PingOne SSO—enables customers to enforce intelligent, policy-driven access decisions at the edge, closer to users and applications. This low-code/no-code integration allows security teams to embed continuous risk evaluation, dynamic authorization, and single sign-on into existing apps and APIs without complex customizations. It simplifies deployment, strengthens security posture, and improves agility by separating security logic from application code—making it easier to adapt to evolving threats and compliance needs."

What This Means for You

Whether you’re an identity leader, an architect, or an IAM pro, the Ping Identity Platform gives your team a modern, secure, and flexible foundation to:

  • Drive business agility with cloud-ready identity services

  • Meet compliance with FIPS, FIDO, FAPI, and Open Banking standards

  • Simplify operations with better observability, performance, and tooling

  • Enhance trust with intelligent risk signals and identity verification

Ready to Get Started?

Explore the documentation, read the full release notes, and talk to us at Ping Identity about how the Ping Identity Platform can help you boost agility, streamline operations, speed time-to-market, and protect your business through secure, convenient, trusted relationships with your users.

 

Share this Article:
Related Resources

Start Today

See how Ping can help you deliver secure employee, partner, and customer experiences in a rapidly evolving digital world.