CIS14: PingID

Post on 15-Jan-2015

276 views 1 download

Tags:

description

Shmulik Ben-Shemen, Ping Identity Demonstration of Ping Identity’s newest solution to the Identity challenge, using your mobile device as part of a strong authentication solution that integrates with Ping’s other solutions—PingFederate and PingOne

Transcript of CIS14: PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 2

swipe > work

Shmulik Ben-Shemen GM Mobile & Strong Authentication Ping Identity

So how do you want your strong auth?

Copyright © 2014 Ping Identity Corp. All rights reserved.3

Introducing PingID

Copyright © 2014 Ping Identity Corp. All rights reserved. 4

•  Multifactor authentication via mobile app for PingOne® and PingFederate®

•  Define and enforce policies tailored to

your needs

•  Simple security for end users

Swipe to Sign On

USING IT PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 5

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 6

User signs on to PingOne® 1

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 7

Authentication notification is pushed to your device 2

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 8

Swipe to authenticate 3

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 9

Off to work you go! 4

Using PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 10

Swipe to authenticate at sign on

No connection? No problem! Available one-time passcode when device is offline

Manage and change the device you use

HOW IT WORKS PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 11

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 12

DESKTOP SIGN-ON

Authorization request Authorization reply

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 13

VERIFIED USER ACCOUNT

DESKTOP SIGN-ON

Authorization request

1

Authorization reply

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 14

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 15

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 16

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

5 Authorization reply

How PingID Works

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 18

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

5 Authorization reply PingID Agent

User Store

VPN

How PingID Works

Copyright © 2014 Ping Identity Corp. All rights reserved. 19

MOBILE NOTIFICATION

SERVER

VERIFIED USER ACCOUNT

USER’S MOBILE DEVICE DESKTOP SIGN-ON

Authorization request

1

Notify PingID app on device 2

3

Push notification

4 Out Of Band Authentication

5 Authorization reply

Your Service Here

GETTING IT PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 20

Deploy PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 21

1st or 2nd Factor Auth

2nd Factor Auth

Pair Your Device

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 22

User scans the QR code from the app

Device is registered and ready for use

User is prompted to install the PingID mobile app

WHAT’S IT WORTH TO YOU? PingID

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 23

The Customer Perspective

Copyright © 2014 Ping Identity Corp. All rights reserved.24

One secure app to authenticate any employee, partner or customer

One authentication service for any cloud, web, VPN or mobile service

Service

Benefits

Replace passwords or add multi-factor

Smarter and faster than tokens and OTPs

Lower TCO—no hardware and transaction cost

More than access—brand and fit for yourself

Use across channels— mobile, online, call center, POS

What’s Next for You

Copyright © 2014 Ping Identity Corp. All rights reserved. 25

What you have Where you are What/Who you are What you know

DEMO…

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 26

Try us – www.pingidentity.com

Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 27

THANK YOU!

Copyright © 2014 Ping Identity Corp. All rights reserved. 28 Confidential — do not distribute

PingID - Roadmap

Phase I • Ping One / Ping Fed Support • Managed by customers • Self Service • PingID as 1st or 2nd Factor • SMS support • VPN (Limited Support)

Phase II • Location Based Policies • Secure Data Capture • SDK • VPN (Extended Support)

Phase III • Risk Based Authentication • Continuous Authenticaiton • Biometrics

H2/14 H1/15 H2/15