SSO to the PingOne for Enterprise admin portal with multi-factor authentication
If you have configured single sign-on (SSO) to the admin portal, you can improve security by requiring multi-factor authentication (MFA) using PingID.
Before you begin
You must complete the following:
MFA to the PingOne for Enterprise admin portal is enforced through PingOne for Enterprise, so even if you’ve configured PingFederate Bridge for PingID authentication, you still need to enable a PingOne for Enterprise authentication policy for PingID. For more information, see Create or update an authentication policy. |
About this task
If the username your administrator uses for SSO to the admin console differs from the email address they use for PingOne for Enterprise, PingID treats that username as a separate identity. You can streamline the admin SSO experience with the following recommended configuration:
If your admin users' usernames are the same as the email address that they use to sign on to the admin portal, you can ignore this configuration because usernames will be the same for PingID. |
Steps
-
In the PingOne for Enterprise admin portal, go to Setup → Authentication Policy.
-
Click Edit.
-
Select Enable authentication policy.
-
On the Apply policy to line, click Selected groups and select the check boxes of the groups assigned as administrative groups.
To improve security, click All cases to require all users to authenticate using MFA.
-
Select the Apply authentication policy to PingOne Admin Portal check box.
-
Optional: In the Do not apply authentication policy to list, select an administrator.
Exempting a designated administrator from the authentication policy allows that administrator to sign on to the admin portal in case of problems with PingID.
-
In the PingID username attribute for SSO admins line, select an SSO method for administrators:
Choose from:
-
SSO Username: Administrators sign on using their username and PingID devices as they would to sign on to the PingOne Dock.
-
Email: Administrators sign on using their email address and PingID devices as they would to sign on to the admin portal.
Selecting Email is not recommended unless you intend for admins to sign on through SSO as well as directly using their email and password. This will usually require admins to maintain a second set of PingID devices specifically for admin access.
-
-
Select the Apply to all sign-on attempts check box.
-
Click Save.
Next steps
If you want to configure an advanced PingID authentication policy for your administrative users, see Configuring an app or group-specific authentication policy in the PingID documentation.