Getting started with PingID core settings
Learn how to configure and use core PingID settings, including a detailed walkthrough of the advanced options.
This guide covers only the configuration of the core PingID settings. For tasks such as configuring an identity provider, branding, PingID policies, and device pairing settings, see the PingID Administration Guide.
Before you begin
You must:
-
Have a web browser with connectivity to the Internet.
-
Have a PingID instance that needs to be newly configured or that needs a configuration change.
Configuring PingID quick setup
Configure PingID with the most common settings.
About this task
To get your PingID instance up and running quickly:
Steps
-
In your PingOne environment, click the Overview tab.
-
From the Services section, click the PingID icon.
-
Go to Setup → PingID → Configuration.
If you’re using a trial mode of PingID, you see a notice at the top of the PingID Settings page indicating that your features are limited.
To upgrade your license, contact sales@pingidentity.com.
-
In the Admin Message field, enter contact information to aid users experiencing trouble.
Example:
For example:
For support with PingID, contact helpdesk@mycompany.com.
-
To give your users time to get acquainted with the addition of multi-factor authentication (MFA), in the Mandatory Enrollment Date section, enter a date 30 days from the current date.
-
To allow users to self-enroll an MFA device the first time they’re prompted for MFA, in the Self-enrollment During Authentication section, click Enable.
-
To allow your users to enroll multiple devices, in the Maximum Allowed Devices field, enter a number greater than 1.
-
To prevent your users from having to select an MFA device every time they authenticate, in the Device Selection section, click Default to Primary.
-
To allow users to disconnect their mobile device without administrator approval, in the Device Management section, select the Allow users to unpair and change devices using the mobile app check box.
-
To allow users to manage their devices in the PingID console, in the Device Management section, select the Allow users to manage their devices on the web and Enable device management for users with no paired devices check boxes.
-
To avoid sending an email to a user every time a new MFA device is added, in the Email Notification for New Devices section, click Disable.
-
To maintain the 40-second MFA challenge timeout default, in the New Request Duration section, click Default.
-
To allow users to use a one-time passcode (OTP) on their mobile app if a push notification doesn’t reach their device, in the One-time Passcode Fallback section, click Enable.
-
To require a mobile device to attempt a push notification before the user can use an OTP, in the Direct Passcode Usage section, click Disable.
-
To allow the use of a device’s native biometrics for an MFA challenge, in the Device Biometrics section, click Enable.
-
To enable both iOS and Android devices, in the Enable On section, select the iOS and Android check boxes.
-
To prevent accidental automatic MFA approvals when FaceID is enabled, in the Face ID Consent section, click Enable.
-
To require users to unlock their device before approving an MFA challenge, in the Authentication While Device is Locked section, click Disable.
-
To enable the most common MFA types, in the Alternate Authentication Methods section, select the Enable and Pairing check boxes for SMS, Voice, and Email.
-
To allow users to provide their own phone numbers and email addresses when enrolling a device, clear the Pre-populate and Restrict check boxes for SMS, Voice, and Email.
-
To maintain English as the supported language, in the Local Language for Voice Calls section, click Disable.
-
To prevent abuse of SMS or Voice services, set the Daily Used SMS/Voice Limit field to
15
and the Daily Unused SMS/Voice Limit field to10
. -
To use the default PingID SMS and voice provider, in the Twilio Account section, click Ping Identity.
-
To use English for all SMS messages, in the Local Language for SMS section, click Disable.
-
To enable the simple use of the Desktop OTP application:
-
In the Desktop Security PIN section, click Disable.
-
In the Use Proxy for Desktop section, click Disable.
-
-
To enable a simple configuration for security keys:
-
In the Resident Key section, click Not Required.
-
In the User Verification section, click Preferred.
-
-
To allow enforcement of MFA policies that you define, in the Enforce Policy section, click Enable.
-
To enforce policies specifically for the PingID Windows login agent, in the Enforce Policy for Windows Login, click Enable.
-
If you are using a trial version of PingID, to prevent your users from being locked out if your trial expires, in the Evaluation section, click Allow single sign-on without PingID.
PingID advanced setup
Use this topic for a description each of the settings in the PingID configuration and how to use them.
When you are ready to customize your configuration beyond the recommended defaults, use the following tables to determine the settings that best meet your business and technical needs.
Support
Section | Description |
---|---|
Admin Message |
The end user sees the Admin Message field when a multi-factor authentication (MFA) challenge is issued. The message should provide directions on getting help if the user has trouble signing on. For example: This field is optional. |
Enrollment
Section | Description | ||
---|---|---|---|
Mandatory Enrollment Date |
The Mandatory Enrollment Date section specifies the last date an end user can choose not to enroll a device in PingID. When users are presented with an MFA challenge for the first time, they are prompted to enroll a device in the PingID service. This option allows existing users a grace period before requiring enrollment in PingID.
|
||
Self-Enrollment During Authentication |
The Self-Enrollment During Authentication section specifies whether the end user is presented with the built-in PingID enrollment process during the user’s first MFA challenge:
|
Devices
Section | Description | ||||
---|---|---|---|---|---|
Maximum Allowed Devices |
The Maximum Allowed Devices setting specifies the maximum number of devices each user can enroll in PingID for MFA challenges. This provides a fallback in the event that a primary device is lost, stolen, or damaged. It also allows organizations to create policies that require a specific device to be used in different MFA challenges.
Organizations should balance user convenience with security when choosing a value for the Maximum Allowed Devices section. The default value is |
||||
Device Selection |
The Device Selection option specifies whether a user’s primary device is used as the default for MFA. This option is shown when Maximum Allowed Devices is greater than 1.
|
||||
Device Management |
The Device Management section has three options:
|
||||
Email Notification For New Devices |
The Email Notification for New Devices section specifies whether PingID sends an email notification to the end user when a new MFA device is enrolled for their account:
|
Mobile App Authentication
Section | Description | ||||
---|---|---|---|---|---|
New Request Duration |
The New Request Duration setting defines the maximum amount of allowed time for an MFA challenge to reach a device before timing out as well as the total amount of time allowed for an MFA response before timeout:
This is the recommended choice for most organizations.
|
||||
One-Time Passcode Fallback |
This allows the organization to configure whether the end user can use a one-time passcode (OTP) within the PingID mobile application to complete an MFA challenge if the mobile push notification times out:
|
||||
Direct Passcode Usage |
If One-Time Passcode Fallback is set to Enable, the Direct Passcode Usage option is displayed. Direct Passcode Usage configures whether the end user can use an OTP to complete an MFA challenge before a mobile push notification times out:
|
||||
Device Biometrics |
The Device Biometrics section determines whether the PingID mobile app can use the native biometric capabilities of the mobile device, such as fingerprint authentication or face recognition:
|
||||
Authentication While Device is Locked |
The Authentication While Device is Locked section determines whether the PingID mobile application presents the swipe option over the Android lock screen. Enabling this setting streamlines the user experience on Android devices, but also makes it easier for a fraudulent MFA approval. Organizations should weigh the user experience against the weaker security footprint when configuring this setting:
|
Alternate Authentication Methods
The following table shows the options for SMS, Voice, Email, YubiKey, Desktop, Security Key, OATH Tokens, and FIDO2 Biometrics.
Option | Description | ||
---|---|---|---|
Enable |
Selecting the Enable check box of the corresponding item enables the use of that type of device for MFA challenges within PingID.
|
||
Pairing |
Selecting the Pairing check box of the corresponding authentication method allows device pairing for that method. This check box is automatically selected when an authentication method is enabled. Disabling pairing is useful to phase out a specific method of authentication without blocking existing users from authenticating.
|
||
Pre-Populate |
The Pre-Populate check box tells PingID to retrieve a value from an associated identity repository for that authentication type. To use the Pre-Populate setting, you must have an identity repository configured in PingOne or have the appropriate attributes configured within PingOne if you are using the internal PingOne directory. For more information, see Identity providers and Configuring the phone number attribute in PingOne.
|
||
Restrict |
The Restrict check box is enabled for any factor which has the Pre-Populate value selected. If Restrict is selected, the user cannot change the pre-populated value for that device. For example, if Pre-Populate and Restrict are selected for SMS, a phone number is pre-populated from the integrated identity repository, and the user cannot change that phone number. |
||
Backup Authentication |
The Backup Authentication check box specifies whether the selected device factor can be used in the event that a user is unable to use a registered device. The types of devices that an organization enables for alternate authentication methods should be determined by the amount of control an organization wants to have over their user’s MFA devices as well as the impact of that device on the organization’s security footprint:
In this scenario, the device type is not available for registration, but can still be used to assist a user complete an MFA challenge if the user indicates that their registered MFA devices are unavailable.
|
Section | Description | ||||
---|---|---|---|---|---|
Voice |
The Local Language for Voice Calls setting allows voice calls, if enabled as a factor, to be performed in a language local to the end user when using web-based SSO. The local language is determined by the language specified in the user’s browser:
|
||||
SMS/Voice |
SMS and voice MFA challenges are performed utilizing Twilio. The Twilio Account section allows the organization to choose whether to use Ping Identity’s Twilio account or to use the organization’s own Twilio account:
The Daily Used SMS/Voice Limit and Daily Unused SMS/Voice Limit sections specify how many SMS or voice calls a user can receive each day. This prevents abuse of the SMS and voice service.
For more information, see SMS and voice usage limits. |
||||
Desktop |
Ping Identity provides a desktop application for Windows and Mac which presents an OTP for use during MFA challenges. This application should not be confused with the PingID integrated Windows login adapter. The Desktop section is only visible if Desktop has been enabled in the Alternate Authentication Methods section. To provide an additional layer of protection for the desktop application, the Desktop Security PIN setting determines whether a PIN is required to unlock the desktop application. The PIN for the desktop application is uniquely set by each user:
|
||||
Security Key |
The Security Key section contains two options:
|
Policy
Setting | Description |
---|---|
Enforce Policy |
The Enforce Policy setting is a master on-off switch for PingID authentication policies:
For more information on creating policies or to view the PingID documentation on policies, see Authentication policy. |
Enforce Policy for Windows Login |
The Enforce Policy for Windows Login setting tells PingID whether to process PingID policies specifically for the Windows login adapter:
|
Evaluation
If you are running a trial of PingID, the Evaluation section is visible. After you purchase PingID, the Evaluation section is no longer displayed.
Setting | Description |
---|---|
Expiration Policy |
The Expiration Policy setting determines how PingID behaves when an organization’s PingID trial has expired:
|