Ping Identity has integrated its PingID multi-factor authentication (MFA) solution with Microsoft Azure Active Directory (Azure AD) and Microsoft Active Directory Federation Services (ADFS).
This latest integration furthers the relationship between Ping Identity and Microsoft by enabling enterprises to quickly move applications to Azure AD. The Ping Identity Platform provides enhanced and user-friendly security with contextual convenience designed for hybrid IT environments. This added flexibility is key as organizations make their transition more seamless, and PingID provides that critical level of security in both hybrid IT or cloud-only environments.
This is just one of three major capabilities enabled as a result of Ping Identity’s integration with Azure AD. In addition to offering enterprises the ability to leverage PingAccess for Azure AD and PingFederate and Azure AD Connect, this announcement highlights using PingID for adaptive multi-factor authentication. It balances secure access to applications with ease of use for the end user, and helps define and enforce authentication policies that are tailored to enterprise needs. Users can add and select from multiple authentication methods and devices on the fly—ultimately reducing support calls. The solution gives users the freedom to put MFA everywhere it is needed for employees, partners and customers.
Ping provides solutions that connect Microsoft and non-Microsoft infrastructures, making Microsoft Office 365 and Azure AD easier to use, more secure and productive. Whether the user’s journey starts with authenticating via on-premises Active Directory or cloud-based Azure Active Directory, the experience is the same: seamless, secure access to all applications, regardless of where they exist.
“The integration with Microsoft is vital for enterprises that rely on Office 365 and the Microsoft identity structure of Azure AD and on-premises Active Directory,” said Loren Russon, vice president, product management, Ping Identity. “Using PingID, enterprises can offer this contextual second-factor authentication, regardless of where the initial authentication occurs.”