Access Management

Authentication nodes configuration reference

This page covers the configuration of the authentication nodes that are built into AM.

Additional authentication nodes are available from the Ping Identity Marketplace.

Basic authentication nodes

Use the following nodes for basic authentication tasks, such as collecting usernames and passwords:

Risk management authentication nodes

Use the following nodes to examine the perceived risk associated to the authentication and act on it:

Behavioral authentication nodes

Use the following nodes to adjust the behavior of authentication trees:

Federation authentication nodes

Thing authentication nodes

Use the following nodes to perform various tasks related to authenticating IoT things:

Uncategorized authentication nodes