Getting started with PingOne Risk - PingOne - PingOne Cloud Platform

PingOne Cloud Platform

bundle
pingone
ft:publication_title
PingOne Cloud Platform
Product_Version_ce
PingOne
PingOne Cloud Platform
category
Product
p1
p1cloudplatform
ContentType_ce
Page created: 18 Feb 2022 |
Page updated: 10 May 2023
| 1 min read

PingOne Cloud Platform PingOne Product Product documentation Content Type Administrator Audience IDaaS Deployment Method Access security Capability Administration User task Configuration

Follow these steps to start using PingOne Risk as part of your authentication flows.

The steps described here assume that you have already created an organization in PingOne and have created at least one environment. For information on creating an organization and creating environments, see Creating an organization and environment in PingOne.

The main steps required to start using PingOne Risk are:

  1. Integrate with PingFederate or create a worker application.
  2. Add risk evaluation to your authentication flow.
  3. Send transaction feedback.
  4. Configure a risk policy.
    Note:

    If you skip this step, whenever you perform risk evaluation, the default risk policy will be used. You can also edit the default risk policy.

There are three ways to integrate your risk policy into an authentication flow:

  • Using the integration with PingFederate
  • Building a custom flow with PingOne DaVinci
  • Using the PingOne API

These sections spell out the specific steps to carry out for each of these risk evaluation integration routes.

Getting started with PingOne Risk - using PingFederate

Page created: 22 Mar 2022 |
Page updated: 10 May 2023
| 1 min read

PingOne Cloud Platform PingOne Product Product documentation Content Type Administrator Audience IDaaS Deployment Method Access security Capability Administration User task Configuration

Configure risk-based authentication using PingFederate as the IdP.

PingFederate must be installed. For help installing PingFederate, see Installing PingFederate.

  1. Deploy the integration files
  2. Create a connection between PingOne and PingFederate.
  3. Optionally, integrate device profiling.
  4. Configure an adapter instance.
  5. Create a risk policy in PingOne.
  6. Add risk evaluation to your authentication flow.
    The response returns a final risk evaluation result: High, Medium, or Low.

    Risk evaluation feedback is a crucial part of a flow that uses risk evaluation. This step is included after authentication has been completed, and it consists of sending an update with the final state of the transaction, such as success or failed. This step is essential for improving the accuracy of the machine learning models. When you use PingOne Risk in conjunction with PingFederate, risk evaluation feedback is included automatically.

  7. Configure PingFederate to forward IP addresses.
  8. Optionally, add custom risk predictors.

Getting started with PingOne Risk - creating flow with DaVinci

Page created: 22 Mar 2022 |
Page updated: 10 May 2023
| 1 min read

PingOne Cloud Platform PingOne Product Product documentation Content Type Administrator Audience IDaaS Deployment Method Access security Capability Administration User task Configuration

  1. Configure a risk policy. See Risk policies.
  2. After you have added DaVinci to your PingOne environment, any risk connectors you add to your flows already have been configured with the correct information for environment ID, client ID, and client secret. However, if you import a flow from a different PingOne environment, you must go to the settings for the risk connector and update this information to reflect the environment where you are adding the flow.
  3. Add the following risk elements to your flow by following the directions in the documentation for the PingOne Risk Connector.
    1. Add risk evaluation to your authentication flow by adding a risk connector with the Create risk evaluation capability.
      The response returns a final risk evaluation result - High, Medium, or Low.
    2. Add risk evaluation feedback to the flow by adding a risk connector with the Update risk evaluation capability. This step is included after authentication has been completed, and it consists of sending an update with the final state of the transaction, such as success or failed. This step is essential for improving the accuracy of the machine learning models.

Getting started with PingOne Risk - using PingOne API

Page created: 22 Mar 2022 |
Page updated: 10 May 2023
| 1 min read

PingOne Cloud Platform PingOne Product Product documentation Content Type Administrator Audience IDaaS Deployment Method Access security Capability Administration User task Configuration

  1. Create a worker application and get an access token, as described in Creating a worker application and getting an access token
  2. Configure a risk policy. See the documentation for creating a risk policy set with the API.
  3. Add risk evaluation to your authentication flow. See the section on risk evaluation in the API reference..
    The response returns a final risk evaluation result - High, Medium, or Low.
  4. Add risk evaluation feedback to the flow. This step is included after authentication has been completed, and it consists of sending an update with the final state of the transaction, such as success or failed. This step is essential for improving the accuracy of the machine learning models. See PUT UPDATE Risk Evaluation in the API reference.