PingID Features
What are the features of PingID?
Authentication type
- Software Token
- Biometric Factor
- Mobile-Push
Functionality
- Multi-Device Sync
Implementation
- Easy Setup
Top Rated PingID Alternatives
PingID Categories on G2
Filter for Features
Authentication Options
Authentication User experience | Process of providing credentials and logging into multiple systems is easy and intuitive for users | Not enough data | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case | Not enough data | |
Federation/SAML support (idp) | Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. | Not enough data | |
Federation/SAML support (sp) | Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. | Not enough data |
Access Control Types
Endpoint access | Provides ability to control access to PC's, Mobile devices, and other endpoint devices. | Not enough data | |
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data | |
Supports BYOD users | Enables users to use their own device to access company applications. | Not enough data |
Administration
Ease of installation on server | Installation process is easy and flexible. | Not enough data | |
Password Policy Enforcement | Options for resetting and enforcing password policies | Not enough data | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | Not enough data | |
Ease of connecting applications | Easily provisions new systems, platforms or applications using configuration and not customization. | Not enough data | |
Self Service Password Administration | Users can set, change passwords without interaction from IT staff | Not enough data | |
Encryption | Encrypts all data transfers using end-to-end encryption. | Not enough data | |
Audit Trails | Provides audit trails to monitor useage to reduce fraud. | Not enough data | |
Regulatory Compliance | Complies with regulations for strong customer authentication such as KYC, PSD2, and others. | Not enough data |
Platform
Multiple Operating system support | Supports Endpoint access control to multiple operating systems | Not enough data | |
Multi-Domain Support | Allows user authentication to be honored by all the hosts in two or more domains | Not enough data | |
Cross Browser support | Support access to browser based applications across required browser types | Not enough data | |
Fail over protection | Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | Not enough data | |
Reporting | Contains pre-built and custom reporting tools to required to manage business | Not enough data | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. | Not enough data | |
Third Party Web Services support | Can call and pass credentials to third party web services. | Not enough data |
Authentication type
SMS-Based | Sends a one-time passcode (OTP) via SMS. | Not enough data | |
Voice-Based Telephony | Provides a one-time passcode (OTP) via voice-call. | Not enough data | |
Email-Based | Sends a one-time passcode (OTP) via email. | Not enough data | |
Hardware Token-Based | Supports hardware tokens, which are often USB-sized, fob-like devices that store codes. | Not enough data | |
Software Token | Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline. This feature was mentioned in 12 PingID reviews. | 93% (Based on 12 reviews) | |
Biometric Factor | Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor. 10 reviewers of PingID have provided feedback on this feature. | 83% (Based on 10 reviews) | |
Mobile-Push | Based on 11 PingID reviews. Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet. | 91% (Based on 11 reviews) | |
Risk-Based Authentication | Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user. | Not enough data |
Functionality
Multi-Device Sync | Based on 11 PingID reviews. Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this. | 91% (Based on 11 reviews) | |
Backup | Offers encrypted backup recovery stored by the vendor. | Not enough data |
Integration
Uses Open Standards | Connections use open standards such as SAML or RADIS. | Not enough data | |
Mobile SDK | Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications. | Not enough data | |
Workforce Authentication | Integrates with identity and access management (IAM) solutions to manage workforce authentication. | Not enough data | |
Customer Authentication | Integrates with customer identity and access management (ICAM) solutions to manage customer authentication. | Not enough data |
Implementation
Easy Setup | Offers an easy to understand user interface to make setup smooth. 13 reviewers of PingID have provided feedback on this feature. | 92% (Based on 13 reviews) | |
Mobile SDK | Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android. | Not enough data | |
Web SDK | Offers a software development kit (SDK) for web-based applications. | Not enough data |