PingID authentication subflow enhancements
The PingID
authentication subflow now includes the following features:
- We’ve added the ability to evaluate and apply PingID policy to the PingID sub-flows To support this enhancement, we've added the Policy Evaluation capability to the PingID connector.
- Administrators can now define a list of mandatory authentication methods. If defined, users are forced to register all of the required authentication methods in order to access their resources.
- If a user does not have a registered device during an authentication flow, after they successfully register a new device they are also required to authenticate with the new device.