Overview of the SSO flow
With the ThreatMetrix Integration Kit, PingFederate includes ThreatMetrix in the sign-on flow.
The following figure shows how ThreatMetrix is integrated into the sign-on process:
Description
-
A user initiates the sign-on process by requesting access to a protected resource.
-
Depending on the device profiling method, the ThreatMetrix IdP Adapter or a previous authentication adapter collects the device profile and sends it back to ThreatMetrix with a session ID.
For the "captured by a previous adapter" device profiling method, this step takes place at the same time as step 1.
-
The ThreatMetrix IdP Adapter sends the session ID and any optional user attributes to ThreatMetrix.
-
ThreatMetrix responds with the review status("pass", "review", "challenge", or "reject") as well as additional attributes and sign-on event data.
-
The ThreatMetrix IdP Adapter makes the review status and attributes and sign-on event data available in the PingFederate authentication policy.
-
PingFederate continues executing the authentication policy, which branches based on the review status provided by the adapter.
-
If the user authenticates successfully, PingFederate returns the resource that the user requested.
-
Optional: If the review status was ""review"" and authentication ultimately succeeded, the adapter notifies ThreatMetrix. This allows ThreatMetrix to train models and tune policies for future sign-on attempts.