PingOne Advanced Identity Cloud

Advanced Identity Cloud deep dives

Selected pages from across all Ping Identity product documentation to complement PingOne Advanced Identity Cloud docs

icon am PingAM

Provides infrastructure for managing users, roles, and access to protected resources.

Intelligent Authentication
•   Multi-factor authentication
•   Web and Java Policy Agents for SSO
•   Authenticator application

Authorization
•   Authorization and policy decisions
•   Web and Java Policy Agents for enforcement
•   Authorize one-time access with transactional authz
•   Dynamic OAuth 2.0 authorization

Federation
•   SAML 2.0
•   Introduction to SAML 2.0
•   Configure IdPs, SPs, and CoTs
•   Implement single sign-on and single logout

 
•   OpenID Connect 1.0 (OIDC)
•   OAuth 2.0
•   Dynamic OAuth 2.0 authorization

icon idm PingIDM

Reconciles customer identity data to ensure accurate information across disparate resources within an organization.

Identity Synchronization
•   Synchronization types
•   Connector reference

User Self-Service
•   User self-service overview

Identity Lifecycle and Relationships
•   Synchronization
•   Managed objects
•   Relationships between objects
•   Roles
•   Use assignments to provision users

Social Identity
•   Social authentication

20 Edge Security

Integrates web applications, APIs, microservices, Internet of Things devices, and cloud-based services with the Ping Identity Identity Platform.

Identity Gateway
•   Studio
•   Single sign-on and cross-domain single sign-on
•   Get login credentials from data sources
•   Get login credentials from AM
•   Enforce policy decisions from AM
•   Harden authorization with advice from AM
•   Validate certificate-bound access tokens
•   Financial-grade API (FAPI)
•   Throttle requests to protected applications
•   Proxy WebSocket traffic

Federation using Identity Gateway
•   Act as an OpenID Connect relying party
•   Act as an OAuth 2.0 resource server
•   SAML 2.0 single sign-on and federation
•   Transform OIDC ID tokens into SAML assertions

Microservices Security
•   Token validation microservice