Page created: 3 Jun 2020
|
Page updated: 21 May 2023
| 6 min read
PingId Product
You can configure PingID authentication options according to your organization's security policy and the different use cases relevant to your organization.
PingID mobile app authentication
- Configure biometrics authentication for the PingID mobile app
- Configure the duration of new authentication requests
- Configure one-time passcode fallback
- Configure direct passcode usage
- Configure authentication when the device is locked
- Enable or disable location collection
- Define the authenticating app appearance
PingID desktop app authentication
- Configure the PingID desktop app
- Configure the PingID desktop app PIN
- Reset a user's desktop app PIN
- Enable or disabling automatic updates
- Configure PingID Proxy for the PingID desktop app
- Configure Proxy Auto Configuration
- Configure Kerberos proxy authentication
- Set up PingID desktop app on Windows using the UI
- Install the desktop app using the Windows CLI
- Set up PingID desktop app on a Mac using the UI
- Install the desktop app using the Mac CLI
- Troubleshoot the desktop app
FIDO2 biometrics
(Apple Touch ID, iOS biometrics, Windows Hello, and Android biometrics capabilities)
FIDO2 security key
YubiKey authentication
OATH token authentication
Email authentication
SMS and voice authentication
Additional options
Next steps...
To apply policies to authentication methods, see PingID policy settings.