PingID Offline MFA
PingID runs as a cloud service on the PingOne platform. To allow users to authenticate even if the PingID service is unreachable, PingID includes offline multi-factor authentication (MFA).
Offline MFA must be configured, so make sure to carry out the steps outlined here before you actually encounter such a situation.
You can configure PingID offline MFA for the following use cases:
-
Access through PingFederate single sign-on (SSO)
-
Access through RADIUS password credential validator (PCV)
-
Access through Windows login
-
Access through Windows login (passwordless)
-
Access through Mac login
-
Access through the PingID integration with SSH
Below is an outline of the steps required to configure offline MFA for each of these cases. Links are provided to the detailed information for each case.
|
PingID offline MFA when authenticating through PingFederate single sign-on (SSO)
Offline MFA requires the following:
-
A user directory to store user device information from PingID. For more information, see User directory for PingID offline MFA.
-
Unlimited Strength Java Cryptography Extension (JCE), which is required for supporting the 256-bit key size for cryptographic algorithms. Without it, the feature will return an exception related to the missing library, and will not function.
When the PingID service is unreachable, after first-factor authentication, the user receives a QR code on an offline authentication screen.
To enable offline authentication, carry out the optional offline MFA step described in Installing the PingID Integration Kit for PingFederate, and configure offline MFA for the PingID Adapter as described in Configuring offline MFA (PingID Adapter).
When configuring the PingID Adapter for offline MFA, the key option to configure is AUTHENTICATION DURING ERRORS, which can be set to one of:
-
Bypass User
-
Block User
-
Passive Offline Authentication
In addition to the standard options listed above, if you encounter a situation where PingID is down but the Passive Offline Authentication option is not prompting users to authenticate offline, you can select the Enforce Offline Authentication option for a limited time until the issue is resolved. This will force all your users to authenticate offline until you switch back to one of the standard options. |
PingID offline MFA when accessing through RADIUS password credential validator (PCV)
When the PingID service is unreachable, after first-factor authentication, the user receives a 12-digit security key in the VPN client.
For detailed instructions on configuring offline MFA with PingID RADIUS PCV, see Configuring offline MFA (RADIUS PCV).
PingID offline MFA does not support RADIUS VPNs with no challenge. |
When configuring offline MFA for the PingID RADIUS PCV, the key option to configure is Authentication During Errors, which can be set to one of:
-
Bypass User
-
Block User
-
Passive Offline Authentication
In addition to the standard options listed above, if you encounter a situation where PingID is down but the Passive Offline Authentication option is not prompting users to authenticate offline, you can select the Enforce Offline Authentication option for a limited time until the issue is resolved. This will force all your users to authenticate offline until you switch back to one of the standard options. |
PingID offline MFA when accessing through Windows login
When the PingID service is unreachable, after first-factor authentication, the user is prompted to authenticate using a security key or the PingID mobile app in offline MFA mode (manual authentication).
For detailed information about configuring offline MFA for Windows login, see Installing the PingID integration for Windows login.
The behavior for offline situations is determined by the value provided for the offlineAuthType
parameter when carrying out command-line installation of the integration with Windows login. You can set offlineAuthType
to:
-
0 - do not allow MFA for offline authentication
-
1 - allow offline MFA using PingID mobile app only
-
2 - allow offline MFA using a FIDO2 security key only
-
3 - allow offline MFA using either PingID mobile app or a FIDO2 security key
PingID offline MFA when accessing through Windows login (passwordless)
When the PingID service is unreachable, after authentication is initiated, the user is prompted to authenticate using a security key or the PingID mobile app in offline MFA mode (manual authentication).
For details, see the description of the Offline Mode option in Creating an authentication policy (Windows passwordless).
PingID offline MFA when accessing through Mac login
When the PingID service is unreachable, after first-factor authentication, the user is prompted to authenticate using a security key or the PingID mobile app in offline MFA mode (manual authentication).
For detailed information about configuring offline MFA for Mac login, see Installing the PingID integration for Mac login.
The behavior for offline situations is determined by the value provided for the offlineAuthType
parameter when carrying out command-line installation of the integration with Mac login. You can set offlineAuthType
to:
-
0 - allow offline MFA with the PingID mobile app
-
1 - if the user does not have a paired PingID mobile app with their account, bypass MFA during login
-
2 - do not allow offline MFA
Offline MFA when using the PingID integration with SSH
When the PingID service is unreachable, after first-factor authentication, the user receives a 12-digit security key in the terminal window.
For detailed information, see Enabling offline MFA in SSH integration.
The behavior for offline situations is determined by the value provided for the fail_mode setting
in the configuration file, which can set to:
-
restrictive
-
passive_offline_authentication
-
permissive
In addition to the standard options listed above, if you encounter a situation where PingID is down but the |