Senior Staff Technical Program Manager at a manufacturing company with 10,001+ employees
Real User
May 23, 2023
From a user perspective, if you need to get into our VPN or virtual private network, which is for remote people, there is protected data behind a vault. And if you need access to the vault, you must use a multi-factor and PingID. Additionally, vicariously, people have to use multi-factor to get into applications. The final aim is to get into laptops and desktops, and you have to use Multi-factor to restart or unlock your PC. You have to use multi-factor. The way that we do multi-factor here is we give the users a choice of using a phone or a Ubiquiti as to something they have. So after they type in their password and username, they're prompted for a device that they have registered, and they have their choice of a phone or a Ubiquiti, or both.
Ping Identity Platform offers cloud capabilities for applications, supporting Single Sign-On, Multi-Factor Authentication, and passwordless authentication. It features flexible integrations and federated identity management, enhancing security through detailed compliance features and seamless IDP integration.This platform meets enterprise needs with role-based access control, device management, API security, and risk-based adaptations. Its BYOD support, ease of integration, biometric...
I've been managing it in my company. I am more on the implementation side.
We use the product to run different reports.
We use PingID for multifactor authentication, passwordless login, and push notifications.
From a user perspective, if you need to get into our VPN or virtual private network, which is for remote people, there is protected data behind a vault. And if you need access to the vault, you must use a multi-factor and PingID. Additionally, vicariously, people have to use multi-factor to get into applications. The final aim is to get into laptops and desktops, and you have to use Multi-factor to restart or unlock your PC. You have to use multi-factor. The way that we do multi-factor here is we give the users a choice of using a phone or a Ubiquiti as to something they have. So after they type in their password and username, they're prompted for a device that they have registered, and they have their choice of a phone or a Ubiquiti, or both.
PingID is similar to identity access management and customer identity access management, however, the profile is different.
I am a reseller for PingID.
We have integrated PingID with different applications. Mainly the internet-facing applications.
We primarily use the solution for access to cloud applications.
We primarily use the solution as software for some of the applications.
My primary use case is for mobile one-time passwords and identity solution. Multi-factor authentification.